Security and Privacy in Communication Networks
Springer International Publishing (Verlag)
978-3-031-64953-0 (ISBN)
- Noch nicht erschienen - erscheint am 05.11.2024
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:
Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.
Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Intrusion and Anomaly Detection.- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification.- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security.- Enhancing Cross Device Security with Fine Grained Permission Control.- The Security Analysis of ROS2 Communication.- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security.- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.- Visibility of Scan Traffic Trends in Sparsely Populated Darknets.- Privacy.- Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks.- Split Without a Leak Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving Reputation Aggregation System.- Program Analysis.- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android Ransomware Generators.- Software Security.- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style for software plagiarism detection.- Understanding and Measuring Inter Process Code Injection in Windows Malware.
Erscheinungsdatum | 15.10.2024 |
---|---|
Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Zusatzinfo | XVII, 517 p. 198 illus., 155 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • authentication • Blockchain • Computer Networks • Computer Security • Computer systems • cryptographic protocols • cryptography • Databases • Data Security • Internet of Things (IoT) • IoT security • Network Protocols • Network Security • privacy • Security and Privacy • Software Design • Software Security • Telecommunication networks • Web and Mobile Security |
ISBN-10 | 3-031-64953-2 / 3031649532 |
ISBN-13 | 978-3-031-64953-0 / 9783031649530 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich