語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security in Computing and Communicat...
~
Ko, Ryan.
Security in Computing and Communications = 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security in Computing and Communications/ edited by Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan.
其他題名:
8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
其他作者:
Fan, Chun-I.
面頁冊數:
X, 305 p. 33 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer System Implementation. -
電子資源:
https://doi.org/10.1007/978-981-16-0422-5
ISBN:
9789811604225
Security in Computing and Communications = 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
Security in Computing and Communications
8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /[electronic resource] :edited by Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan. - 1st ed. 2021. - X, 305 p. 33 illus.online resource. - Communications in Computer and Information Science,13641865-0937 ;. - Communications in Computer and Information Science,498.
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS - Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
ISBN: 9789811604225
Standard No.: 10.1007/978-981-16-0422-5doiSubjects--Topical Terms:
669803
Computer System Implementation.
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Security in Computing and Communications = 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
LDR
:03724nam a22004095i 4500
001
1053100
003
DE-He213
005
20210915131855.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789811604225
$9
978-981-16-0422-5
024
7
$a
10.1007/978-981-16-0422-5
$2
doi
035
$a
978-981-16-0422-5
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
245
1 0
$a
Security in Computing and Communications
$h
[electronic resource] :
$b
8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
$c
edited by Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan.
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
X, 305 p. 33 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0937 ;
$v
1364
505
0
$a
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS - Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.
520
$a
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
650
2 4
$a
Computer System Implementation.
$3
669803
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Computer Communication Networks.
$3
669310
650
1 4
$a
Cryptology.
$3
1211076
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Application software.
$3
528147
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Data encryption (Computer science).
$3
1051084
700
1
$a
Fan, Chun-I.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1357916
700
1
$a
Ko, Ryan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1025022
700
1
$a
Rawat, Danda B.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1247180
700
1
$a
Wang, Guojun.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1051571
700
1
$a
Thampi, Sabu M.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
883145
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811604218
776
0 8
$i
Printed edition:
$z
9789811604232
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-981-16-0422-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入