Autor Feng, Jun
|
|
Documentos disponibles escritos por este autor (2)
Hacer una sugerencia Refinar búsqueda12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings / Wang, Guojun ; Feng, Jun ; Bhuiyan, MD Zakirul Alam ; Lu, Rongxing
![]()
Título : 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings Tipo de documento: documento electrónico Autores: Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVI, 506 p. 317 ilustraciones, 142 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24907-6 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Ordenadores Red de computadoras Ingeniería Informática Inteligencia artificial Seguridad de datos e información Entornos informáticos Redes de comunicación informática Ingeniería Informática y Redes Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2019, celebrada en Atlanta, GA, EE. UU., en julio de 2019. Los 37 artículos completos fueron cuidadosamente revisados y seleccionados de 109 presentaciones. Los artículos cubren muchas dimensiones, incluidos algoritmos y arquitecturas de seguridad, políticas, regulaciones y técnicas conscientes de la privacidad, computación y comunicación anónimas, abarcando enfoques teóricos fundamentales, proyectos experimentales prácticos y sistemas de aplicaciones comerciales para computación, comunicación y almacenamiento. Nota de contenido: Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings [documento electrónico] / Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVI, 506 p. 317 ilustraciones, 142 ilustraciones en color.
ISBN : 978-3-030-24907-6
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Ordenadores Red de computadoras Ingeniería Informática Inteligencia artificial Seguridad de datos e información Entornos informáticos Redes de comunicación informática Ingeniería Informática y Redes Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2019, celebrada en Atlanta, GA, EE. UU., en julio de 2019. Los 37 artículos completos fueron cuidadosamente revisados y seleccionados de 109 presentaciones. Los artículos cubren muchas dimensiones, incluidos algoritmos y arquitecturas de seguridad, políticas, regulaciones y técnicas conscientes de la privacidad, computación y comunicación anónimas, abarcando enfoques teóricos fundamentales, proyectos experimentales prácticos y sistemas de aplicaciones comerciales para computación, comunicación y almacenamiento. Nota de contenido: Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / Wang, Guojun ; Feng, Jun ; Bhuiyan, MD Zakirul Alam ; Lu, Rongxing
![]()
Título : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings Tipo de documento: documento electrónico Autores: Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XV, 332 p. 127 ilustraciones, 97 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24900-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Ingeniería Informática Red de computadoras Visión por computador Inteligencia artificial Seguridad de datos e información Ingeniería Informática y Redes Redes de comunicación informática Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de seis simposios y dos talleres ubicados conjuntamente con SpaCCS 2019, la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento. Los 26 artículos completos fueron cuidadosamente revisados y seleccionados entre 75 presentaciones. Los simposios y talleres de este año son: SPIoT 2019 – Seguridad y Privacidad del Internet de las Cosas; TSP 2019 – Confianza, seguridad y privacidad para aplicaciones emergentes; SCS 2019 – Sistemas de sensores en la nube; UbiSafe 2019 – Computación UbiSafe; ISSR 2019 – Seguridad en la e-Ciencia y la e-Investigación; CMRM 2019 – Métricas de Ciberseguridad y Modelado de Riesgos. Nota de contenido: The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive OperationalModal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings [documento electrónico] / Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, . - 1 ed. . - [s.l.] : Springer, 2019 . - XV, 332 p. 127 ilustraciones, 97 ilustraciones en color.
ISBN : 978-3-030-24900-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Ingeniería Informática Red de computadoras Visión por computador Inteligencia artificial Seguridad de datos e información Ingeniería Informática y Redes Redes de comunicación informática Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de seis simposios y dos talleres ubicados conjuntamente con SpaCCS 2019, la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento. Los 26 artículos completos fueron cuidadosamente revisados y seleccionados entre 75 presentaciones. Los simposios y talleres de este año son: SPIoT 2019 – Seguridad y Privacidad del Internet de las Cosas; TSP 2019 – Confianza, seguridad y privacidad para aplicaciones emergentes; SCS 2019 – Sistemas de sensores en la nube; UbiSafe 2019 – Computación UbiSafe; ISSR 2019 – Seguridad en la e-Ciencia y la e-Investigación; CMRM 2019 – Métricas de Ciberseguridad y Modelado de Riesgos. Nota de contenido: The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive OperationalModal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i

