000 05283nam a22006135i 4500
001 978-981-19-0468-4
003 DE-He213
005 20240423125538.0
007 cr nn 008mamaa
008 220225s2022 si | s |||| 0|eng d
020 _a9789811904684
_9978-981-19-0468-4
024 7 _a10.1007/978-981-19-0468-4
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aUbiquitous Security
_h[electronic resource] :
_bFirst International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers /
_cedited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo.
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _aXVII, 380 p. 148 illus., 114 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1557
505 0 _a A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks -- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning -- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes -- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm -- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem -- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks -- Smart Search over Encrypted Educational Resources in Cloud Storage -- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets -- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media -- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network -- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity -- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System -- Skill Reward for Safe Deep Reinforcement Learning -- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks -- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System.
520 _aThis volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
650 0 _aApplication software.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer crimes.
650 1 4 _aComputer and Information Systems Applications.
650 2 4 _aCryptology.
650 2 4 _aMobile and Network Security.
650 2 4 _aComputer Crime.
700 1 _aWang, Guojun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aChoo, Kim-Kwang Raymond.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKo, Ryan K. L.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aXu, Yang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCrispo, Bruno.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811904677
776 0 8 _iPrinted edition:
_z9789811904691
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1557
856 4 0 _uhttps://doi.org/10.1007/978-981-19-0468-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c179129
_d179129