000 | 04016nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-13-3732-1 | ||
003 | DE-He213 | ||
005 | 20240423125529.0 | ||
007 | cr nn 008mamaa | ||
008 | 181229s2019 si | s |||| 0|eng d | ||
020 |
_a9789811337321 _9978-981-13-3732-1 |
||
024 | 7 |
_a10.1007/978-981-13-3732-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aMobile Internet Security _h[electronic resource] : _bSecond International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / _cedited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2019. |
|
300 |
_aX, 181 p. 146 illus., 75 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v971 |
|
505 | 0 | _aNetworks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications. | |
520 | _aThis book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aArtificial Intelligence. |
700 | 1 |
_aYou, Ilsun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aChen, Hsing-Chung. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSharma, Vishal. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKotenko, Igor. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811337314 |
776 | 0 | 8 |
_iPrinted edition: _z9789811337338 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v971 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-13-3732-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c178947 _d178947 |