Autor Luo, Xiapu
|
|
Documentos disponibles escritos por este autor (2)
Hacer una sugerencia Refinar búsqueda21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / Zhou, Jianying ; Luo, Xiapu ; Shen, Qingni ; Xu, Zhen
![]()
TÃtulo : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers Tipo de documento: documento electrónico Autores: Zhou, Jianying, ; Luo, Xiapu, ; Shen, Qingni, ; Xu, Zhen, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XVII, 833 p. 79 ilustraciones ISBN/ISSN/DL: 978-3-030-41579-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Redes de comunicación informática Seguridad de datos e información Estructuras de datos y teorÃa de la información IngenierÃa de software Ordenador Red inform Ãndice Dewey: 005.73 Estructuras de datos Resumen: Este libro constituye las actas arbitradas de la 21.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2019, celebrada en Beijing, China, en diciembre de 2019. Los 47 artÃculos completos revisados ​​fueron cuidadosamente seleccionados entre 199 presentaciones. Los artÃculos están organizados en temas sobre análisis y detección de malware, seguridad de redes empresariales de IoT y CPS, seguridad de software, seguridad de sistemas, autenticación, seguridad de Internet con criptografÃa aplicada, seguridad de aprendizaje automático, privacidad del aprendizaje automático, seguridad web, esteganografÃa y esteganálisis. Nota de contenido: Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers [documento electrónico] / Zhou, Jianying, ; Luo, Xiapu, ; Shen, Qingni, ; Xu, Zhen, . - 1 ed. . - [s.l.] : Springer, 2020 . - XVII, 833 p. 79 ilustraciones.
ISBN : 978-3-030-41579-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Redes de comunicación informática Seguridad de datos e información Estructuras de datos y teorÃa de la información IngenierÃa de software Ordenador Red inform Ãndice Dewey: 005.73 Estructuras de datos Resumen: Este libro constituye las actas arbitradas de la 21.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2019, celebrada en Beijing, China, en diciembre de 2019. Los 47 artÃculos completos revisados ​​fueron cuidadosamente seleccionados entre 199 presentaciones. Los artÃculos están organizados en temas sobre análisis y detección de malware, seguridad de redes empresariales de IoT y CPS, seguridad de software, seguridad de sistemas, autenticación, seguridad de Internet con criptografÃa aplicada, seguridad de aprendizaje automático, privacidad del aprendizaje automático, seguridad web, esteganografÃa y esteganálisis. Nota de contenido: Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Network and System Security / Au, Man Ho ; Yiu, Siu Ming ; Li, Jin ; Luo, Xiapu ; Wang, Cong ; Castiglione, Aniello ; Kluczniak, Kamil
![]()
TÃtulo : Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings Tipo de documento: documento electrónico Autores: Au, Man Ho, ; Yiu, Siu Ming, ; Li, Jin, ; Luo, Xiapu, ; Wang, Cong, ; Castiglione, Aniello, ; Kluczniak, Kamil, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2018 Número de páginas: XII, 492 p. 167 ilustraciones, 117 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-02744-5 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Ordenador TecnologÃa de la información IngenierÃa Informática Red de computadoras Software de la aplicacion IngenierÃa de software Inteligencia artificial Seguridad de datos e información Aspectos Legales de la Computación IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 12.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2018, celebrada en Hong Kong, China, en agosto de 2018. Los 26 artÃculos completos revisados ​​y los 9 artÃculos breves presentados en este libro fueron cuidadosamente revisados ​​y seleccionados entre 88 presentaciones iniciales. Los artÃculos cubren una amplia gama de temas en el campo, incluyendo blockchain, seguridad móvil, criptografÃa aplicada, autenticación, biometrÃa, IoT, privacidad y educación. Nota de contenido: Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings [documento electrónico] / Au, Man Ho, ; Yiu, Siu Ming, ; Li, Jin, ; Luo, Xiapu, ; Wang, Cong, ; Castiglione, Aniello, ; Kluczniak, Kamil, . - 1 ed. . - [s.l.] : Springer, 2018 . - XII, 492 p. 167 ilustraciones, 117 ilustraciones en color.
ISBN : 978-3-030-02744-5
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Ordenador TecnologÃa de la información IngenierÃa Informática Red de computadoras Software de la aplicacion IngenierÃa de software Inteligencia artificial Seguridad de datos e información Aspectos Legales de la Computación IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 12.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2018, celebrada en Hong Kong, China, en agosto de 2018. Los 26 artÃculos completos revisados ​​y los 9 artÃculos breves presentados en este libro fueron cuidadosamente revisados ​​y seleccionados entre 88 presentaciones iniciales. Los artÃculos cubren una amplia gama de temas en el campo, incluyendo blockchain, seguridad móvil, criptografÃa aplicada, autenticación, biometrÃa, IoT, privacidad y educación. Nota de contenido: Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i

