Amazon cover image
Image from Amazon.com

Silicon Valley Cybersecurity Conference [electronic resource] : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1683Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2022Edition: 1st ed. 2022Description: IX, 137 p. 64 illus., 53 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031240492
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
In: Springer Nature eBookSummary: This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.

Open Access

This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in