|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Xingliang Yuan , Guangdong Bai , Cristina Alcaraz , Suryadipta MajumdarPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2022 Volume: 13787 Weight: 1.151kg ISBN: 9783031230196ISBN 10: 3031230191 Pages: 747 Publication Date: 07 December 2022 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsAI for Network Security.- Vulnerability Detection Using Deep Learning Based Function Classification.- RAIDER: Reinforcement-aided Spear Phishing Detector.- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning.- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics.- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection.- Network Security.- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches.- Reducing Intrusion Alert Trees to Aid Visualization.- Attacker Attribution Through Characteristics Inference Using Honeypot Data.- Detecting Contradictions from CoAP RFC Based on Knowledge Graph.- Mobile Security.- A First Look at Android Apps' Third-party Resources Loading.- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset.- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices.- A Beyond-5G Authentication and Key Agreement Protocol.- IoT Security.- A Survey on IoT Vulnerability Discovery.- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks.- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.- Privacy-Preserving Machine Learning Protocols and Systems.- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning.- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.- An Efficient Clustering-Based Privacy-Preserving Recommender System.- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.- Privacy-Preserving Networked Systems and Protocols.- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server.- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare.- Enabling Secure Deduplication in Encrypted Decentralized Storage.- Geometric Range Searchable Encryption with Forward and Backward Security.- Blockchain Security.- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach.- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.- BSB: Bringing Safe Browsing to Blockchain Platform.- Blockchain-Powered Systems.- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks.- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction.- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment.- Decentralized Access Control for Secure Microservices Cooperation with Blockchain.- Blockchain-Based Access Control for Smart Manufacturer Secure Management System.- Attacks.- Driver Locations Harvesting Attack on pRide.- Rebound Attacks on SKINNY Hashing with Automatic Tools.- Combination Reduction Algorithms and its Application to Subversion Attack.- Cryptographic Algorithms and Protocols.- Evaluating the Security of Merkle-Damg ard Hash Functions and Combiners in Quantum Settings.- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security.- Strengthening the Security of AES Against Differential Fault AttackReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |