Silicon Valley Cybersecurity Conference First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers /
Silicon Valley Cybersecurity Conference First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers / [electronic resource] :
edited by Younghee Park, Divyesh Jadav, Thomas Austin.
- 1st ed. 2021.
- X, 227 p. 89 illus., 62 illus. in color. online resource.
- Communications in Computer and Information Science, 1383 1865-0937 ; .
- Communications in Computer and Information Science, 1383 .
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams -- A Secure Encapsulation Schemes based on Key Recovery System -- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator -- STRISA: A New Regulation Architecture to Enforce Travel Rule -- Post-Quantum Hash-Based Signatures for Secure Boot -- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards -- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management -- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping -- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management -- A Privacy Preserving E-voting System based on Blockchain -- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity -- ConTheModel: Can we modify tweets to confuse classifier models? -- A Systematic Approach to Building Autoencoders for Intrusion Detection -- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure -- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work -- IoT Checker Using Timing Side-channel and Machine Learning.
This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems.
9783030727253
10.1007/978-3-030-72725-3 doi
Data protection.
Database management.
Computer networks .
Computers.
Computer systems.
Artificial intelligence.
Data and Information Security.
Database Management System.
Computer Communication Networks.
Computing Milieux.
Computer System Implementation.
Artificial Intelligence.
QA76.9.A25
005.8
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams -- A Secure Encapsulation Schemes based on Key Recovery System -- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator -- STRISA: A New Regulation Architecture to Enforce Travel Rule -- Post-Quantum Hash-Based Signatures for Secure Boot -- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards -- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management -- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping -- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management -- A Privacy Preserving E-voting System based on Blockchain -- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity -- ConTheModel: Can we modify tweets to confuse classifier models? -- A Systematic Approach to Building Autoencoders for Intrusion Detection -- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure -- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work -- IoT Checker Using Timing Side-channel and Machine Learning.
This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems.
9783030727253
10.1007/978-3-030-72725-3 doi
Data protection.
Database management.
Computer networks .
Computers.
Computer systems.
Artificial intelligence.
Data and Information Security.
Database Management System.
Computer Communication Networks.
Computing Milieux.
Computer System Implementation.
Artificial Intelligence.
QA76.9.A25
005.8