語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Silicon Valley Cybersecurity Conference = third conference, SVCC 2022, virtual event, August 17-19, 2022 : revised selected papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Silicon Valley Cybersecurity Conference/ edited by Luis Bathen ... [et al.].
其他題名:
third conference, SVCC 2022, virtual event, August 17-19, 2022 : revised selected papers /
其他題名:
SVCC 2022
其他作者:
Bathen, Luis.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer Nature Switzerland : : 2022.,
面頁冊數:
ix, 137 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Computer Engineering and Networks. -
電子資源:
https://doi.org/10.1007/978-3-031-24049-2
ISBN:
9783031240492
Silicon Valley Cybersecurity Conference = third conference, SVCC 2022, virtual event, August 17-19, 2022 : revised selected papers /
Silicon Valley Cybersecurity Conference
third conference, SVCC 2022, virtual event, August 17-19, 2022 : revised selected papers /[electronic resource] :SVCC 2022edited by Luis Bathen ... [et al.]. - Cham :Springer Nature Switzerland :2022. - ix, 137 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,16831865-0937 ;. - Communications in computer and information science ;311..
Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford's Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
Open access.
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17-19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.
ISBN: 9783031240492
Standard No.: 10.1007/978-3-031-24049-2doiSubjects--Topical Terms:
1365733
Computer Engineering and Networks.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Silicon Valley Cybersecurity Conference = third conference, SVCC 2022, virtual event, August 17-19, 2022 : revised selected papers /
LDR
:02273nam a2200385 a 4500
001
1105377
003
DE-He213
005
20230118200625.0
006
m d
007
cr nn 008maaau
008
231013s2022 sz s 0 eng d
020
$a
9783031240492
$q
(electronic bk.)
020
$a
9783031240485
$q
(paper)
024
7
$a
10.1007/978-3-031-24049-2
$2
doi
035
$a
978-3-031-24049-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S968 2022
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Silicon Valley Cybersecurity Conference
$h
[electronic resource] :
$b
third conference, SVCC 2022, virtual event, August 17-19, 2022 : revised selected papers /
$c
edited by Luis Bathen ... [et al.].
246
3
$a
SVCC 2022
260
$a
Cham :
$c
2022.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
ix, 137 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1683
505
0
$a
Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford's Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
506
$a
Open access.
520
$a
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17-19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.
650
2 4
$a
Computer Engineering and Networks.
$3
1365733
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
671334
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
700
1
$a
Bathen, Luis.
$e
editor.
$1
https://orcid.org/0000-0002-5756-4953
$3
1402168
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
311.
$3
881211
856
4 0
$u
https://doi.org/10.1007/978-3-031-24049-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入