語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Frontiers in Cyber Security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Frontiers in Cyber Security/ edited by Emmanuel Ahene, Fagen Li.
其他題名:
5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
其他作者:
Li, Fagen.
面頁冊數:
XIII, 430 p. 131 illus., 106 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-981-19-8445-7
ISBN:
9789811984457
Frontiers in Cyber Security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
Frontiers in Cyber Security
5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /[electronic resource] :edited by Emmanuel Ahene, Fagen Li. - 1st ed. 2022. - XIII, 430 p. 131 illus., 106 illus. in color.online resource. - Communications in Computer and Information Science,17261865-0937 ;. - Communications in Computer and Information Science,498.
IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
ISBN: 9789811984457
Standard No.: 10.1007/978-981-19-8445-7doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Frontiers in Cyber Security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
LDR
:04406nam a22004215i 4500
001
1086183
003
DE-He213
005
20221202140832.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811984457
$9
978-981-19-8445-7
024
7
$a
10.1007/978-981-19-8445-7
$2
doi
035
$a
978-981-19-8445-7
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Frontiers in Cyber Security
$h
[electronic resource] :
$b
5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
$c
edited by Emmanuel Ahene, Fagen Li.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XIII, 430 p. 131 illus., 106 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0937 ;
$v
1726
505
0
$a
IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
520
$a
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Computer Engineering and Networks.
$3
1365733
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Computer Communication Networks.
$3
669310
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer networks—Security measures.
$3
1366173
650
0
$a
Computer engineering.
$3
569006
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Cryptography.
$3
567927
650
0
$a
Computer networks .
$3
1365720
650
0
$a
Data protection.
$3
557764
700
1
$a
Li, Fagen.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1210250
700
1
$a
Ahene, Emmanuel.
$e
editor.
$1
https://orcid.org/0000-0002-0810-1055
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1392895
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811984440
776
0 8
$i
Printed edition:
$z
9789811984464
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-981-19-8445-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入