Autor Luo, Xiapu
|
|
Documentos disponibles escritos por este autor (2)
Hacer una sugerencia Refinar búsqueda21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / Zhou, Jianying ; Luo, Xiapu ; Shen, Qingni ; Xu, Zhen
![]()
Título : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers Tipo de documento: documento electrónico Autores: Zhou, Jianying, ; Luo, Xiapu, ; Shen, Qingni, ; Xu, Zhen, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XVII, 833 p. 79 ilustraciones ISBN/ISSN/DL: 978-3-030-41579-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Redes de comunicación informática Seguridad de datos e información Estructuras de datos y teoría de la información Ingeniería de software Ordenador Red inform Índice Dewey: 005.73 Estructuras de datos Resumen: Este libro constituye las actas arbitradas de la 21.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2019, celebrada en Beijing, China, en diciembre de 2019. Los 47 artículos completos revisados fueron cuidadosamente seleccionados entre 199 presentaciones. Los artículos están organizados en temas sobre análisis y detección de malware, seguridad de redes empresariales de IoT y CPS, seguridad de software, seguridad de sistemas, autenticación, seguridad de Internet con criptografía aplicada, seguridad de aprendizaje automático, privacidad del aprendizaje automático, seguridad web, esteganografía y esteganálisis. Nota de contenido: Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers [documento electrónico] / Zhou, Jianying, ; Luo, Xiapu, ; Shen, Qingni, ; Xu, Zhen, . - 1 ed. . - [s.l.] : Springer, 2020 . - XVII, 833 p. 79 ilustraciones.
ISBN : 978-3-030-41579-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Redes de comunicación informática Seguridad de datos e información Estructuras de datos y teoría de la información Ingeniería de software Ordenador Red inform Índice Dewey: 005.73 Estructuras de datos Resumen: Este libro constituye las actas arbitradas de la 21.ª Conferencia Internacional sobre Seguridad de la Información y las Comunicaciones, ICICS 2019, celebrada en Beijing, China, en diciembre de 2019. Los 47 artículos completos revisados fueron cuidadosamente seleccionados entre 199 presentaciones. Los artículos están organizados en temas sobre análisis y detección de malware, seguridad de redes empresariales de IoT y CPS, seguridad de software, seguridad de sistemas, autenticación, seguridad de Internet con criptografía aplicada, seguridad de aprendizaje automático, privacidad del aprendizaje automático, seguridad web, esteganografía y esteganálisis. Nota de contenido: Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Network and System Security / Au, Man Ho ; Yiu, Siu Ming ; Li, Jin ; Luo, Xiapu ; Wang, Cong ; Castiglione, Aniello ; Kluczniak, Kamil
![]()
Título : Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings Tipo de documento: documento electrónico Autores: Au, Man Ho, ; Yiu, Siu Ming, ; Li, Jin, ; Luo, Xiapu, ; Wang, Cong, ; Castiglione, Aniello, ; Kluczniak, Kamil, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2018 Número de páginas: XII, 492 p. 167 ilustraciones, 117 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-02744-5 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Ordenador Tecnología de la información Ingeniería Informática Red de computadoras Software de la aplicacion Ingeniería de software Inteligencia artificial Seguridad de datos e información Aspectos Legales de la Computación Ingeniería Informática y Redes Aplicaciones informáticas y de sistemas de información Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 12.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2018, celebrada en Hong Kong, China, en agosto de 2018. Los 26 artículos completos revisados y los 9 artículos breves presentados en este libro fueron cuidadosamente revisados y seleccionados entre 88 presentaciones iniciales. Los artículos cubren una amplia gama de temas en el campo, incluyendo blockchain, seguridad móvil, criptografía aplicada, autenticación, biometría, IoT, privacidad y educación. Nota de contenido: Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings [documento electrónico] / Au, Man Ho, ; Yiu, Siu Ming, ; Li, Jin, ; Luo, Xiapu, ; Wang, Cong, ; Castiglione, Aniello, ; Kluczniak, Kamil, . - 1 ed. . - [s.l.] : Springer, 2018 . - XII, 492 p. 167 ilustraciones, 117 ilustraciones en color.
ISBN : 978-3-030-02744-5
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Ordenador Tecnología de la información Ingeniería Informática Red de computadoras Software de la aplicacion Ingeniería de software Inteligencia artificial Seguridad de datos e información Aspectos Legales de la Computación Ingeniería Informática y Redes Aplicaciones informáticas y de sistemas de información Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 12.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2018, celebrada en Hong Kong, China, en agosto de 2018. Los 26 artículos completos revisados y los 9 artículos breves presentados en este libro fueron cuidadosamente revisados y seleccionados entre 88 presentaciones iniciales. Los artículos cubren una amplia gama de temas en el campo, incluyendo blockchain, seguridad móvil, criptografía aplicada, autenticación, biometría, IoT, privacidad y educación. Nota de contenido: Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i

