|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Rongmao Chen , Robert H. Deng , Moti YungPublisher: Springer Verlag, Singapore Imprint: Springer Verlag, Singapore ISBN: 9789819562022ISBN 10: 9819562023 Pages: 480 Publication Date: 04 February 2026 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Secure Multi-party Computation. .- Quantum-Computation Classical-Communication Commitments from SZK-Hardness. .- Concretely Efficient Constructions for Differentially Private Set Intersection. .- MSFS: Maliciously Secure 3-Party Feature Selection via Mutual Information. .- Adaptive Batched K-out-of-N Oblivious Transfers Extension. .- Programming Equation Systems of Arithmetization-Oriented Primitives with Constraints. .- Anomaly Detection Methodologies & Models. .- Anomaly Detection for ADS-B Data Based on KAN-LSTM. .- Network Intrusion Detection Method Based on Multi-Scale Feature Clustering and Improved Honey Badger Algorithm. .- SAGE: Spatiotemporal Feature Fusion for Anomaly Detection in Multivariate Time Series. .- MoE-CNN with Dynamic Feature Selection and CSAM for Network Anomaly Detection. .- PP-MTAD: Privacy-Preserving and Efficient Multivariate Time Series Anomaly Detection. .- LogWhisperer: Multi-Log Semantic Similarity Analysis based Intelligent Vehicle Anomaly Detection without Log Template. .- An Early Detection of Risky Crowd Dynamics Scheme Based on Motion Entropy and Scene Semantics. .- Enhancing Explainability in X-IDS through Counterfactuals. .- What Interferes with the Accurate Detection of Origin Hijacking Anomalies?. .- Network Security & Traffic Analysis. .- Verifiable and Privacy-Preserving Deep Packet Inspection for Multiple Rule Service Providers. .- Towards Adaptive Network Defense: A Self-Evolving Threat Detection Framework. .- Early Detection of Malicious Traffic based on Graph Modeling and Spatio-Temporal Attention Approach. .- Revealing the Frailty of Static Benchmarks: The DyNA-IDS Framework for Concept Drift Adaptation in Time-Series Network Intrusion Detection. .- iSSH: Enabling In-Flight SSH Traffic Inspection without Key Escrow. .- Tracing Your Roots: Exploring the Security Issues of Root Certificates in Android TLS Connections. .- Exploring the Root Store Usage in TLS-based Applications. .- LSDBFT: A Loose DAG-based Asynchronous BFT Consensus Algorithm with Fair Ordering. .- FRanCS: A Fair and Randomized Anonymous Network Circuit Selection Mechanism with Blockchain. .- Robust Training of Efficient Traffic Classifier with Noisy Labels. .- A Multimodal Asynchronous Federated Learning Approach for Encrypted Traffic Classification.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||