Science of Cyber Security (Record no. 186413)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05631nam a22006375i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-45933-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423130228.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231120s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031459337 |
-- | 978-3-031-45933-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-45933-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA75.5-76.95 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UNH |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UND |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM030000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UNH |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UND |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 025.04 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Science of Cyber Security |
Medium | [electronic resource] : |
Remainder of title | 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / |
Statement of responsibility, etc | edited by Moti Yung, Chao Chen, Weizhi Meng. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 526 p. 164 illus., 118 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 14299 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11–14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information storage and retrieval systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Database management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data mining. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Machine learning. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Application software. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information Storage and Retrieval. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Database Management. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data Mining and Knowledge Discovery. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Machine Learning. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer and Information Systems Applications. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Yung, Moti. |
Relator term | editor. |
-- | (orcid) |
-- | 0000-0003-0848-0873 |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chen, Chao. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Meng, Weizhi. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031459320 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031459344 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 14299 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-45933-7">https://doi.org/10.1007/978-3-031-45933-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.