Información del autor
Autor Ko, Ryan |
Documentos disponibles escritos por este autor (2)
Crear una solicitud de compra Refinar búsqueda
Security in Computing and Communications / Thampi, Sabu M. ; Martinez Perez, Gregorio ; Ko, Ryan ; Rawat, Danda B.
TÃtulo : Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / Tipo de documento: documento electrónico Autores: Thampi, Sabu M., ; Martinez Perez, Gregorio, ; Ko, Ryan, ; Rawat, Danda B., Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2020 Número de páginas: XV, 376 p. 153 ilustraciones, 90 ilustraciones en color. ISBN/ISSN/DL: 978-981-1548253-- Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Protección de datos Red informática Ordenadores CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Seguridad de datos e información Seguridad móvil y de red Entornos informáticos Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas del Séptimo Simposio Internacional sobre Seguridad en Computación y Comunicaciones, SSCC 2019, celebrado en Trivandrum, India, en diciembre de 2019. Los 22 artÃculos completos revisados ​​y los 7 artÃculos breves revisados ​​presentados fueron cuidadosamente revisados ​​y seleccionados entre 61 presentaciones. . Los artÃculos cubren amplios campos de investigación que incluyen criptografÃa, seguridad de bases de datos y almacenamiento, aspectos humanos y sociales de la seguridad y la privacidad. Nota de contenido: Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication inCloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019, held in Trivandrum, India, in December 2019. The 22 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 61 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / [documento electrónico] / Thampi, Sabu M., ; Martinez Perez, Gregorio, ; Ko, Ryan, ; Rawat, Danda B., . - 1 ed. . - Singapore [Malasia] : Springer, 2020 . - XV, 376 p. 153 ilustraciones, 90 ilustraciones en color.
ISBN : 978-981-1548253--
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Protección de datos Red informática Ordenadores CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Seguridad de datos e información Seguridad móvil y de red Entornos informáticos Clasificación: 5.824 Resumen: Este libro constituye las actas arbitradas del Séptimo Simposio Internacional sobre Seguridad en Computación y Comunicaciones, SSCC 2019, celebrado en Trivandrum, India, en diciembre de 2019. Los 22 artÃculos completos revisados ​​y los 7 artÃculos breves revisados ​​presentados fueron cuidadosamente revisados ​​y seleccionados entre 61 presentaciones. . Los artÃculos cubren amplios campos de investigación que incluyen criptografÃa, seguridad de bases de datos y almacenamiento, aspectos humanos y sociales de la seguridad y la privacidad. Nota de contenido: Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication inCloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019, held in Trivandrum, India, in December 2019. The 22 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 61 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Security in Computing and Communications / Thampi, Sabu M. ; Wang, Guojun ; Rawat, Danda B. ; Ko, Ryan ; Fan, Chun-I
TÃtulo : Security in Computing and Communications : 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers / Tipo de documento: documento electrónico Autores: Thampi, Sabu M., ; Wang, Guojun, ; Rawat, Danda B., ; Ko, Ryan, ; Fan, Chun-I, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2021 Número de páginas: X, 305 p. 33 ilustraciones ISBN/ISSN/DL: 978-981-1604225-- Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa Cifrado de datos (Informática) Red de computadoras Software de la aplicacion Protección de datos Red informática Sistemas informáticos CriptologÃa Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Seguridad móvil y de red Implementación de sistema informático Clasificación: 5.824 Resumen: Este libro constituye una selección revisada de artÃculos del 8.° Simposio Internacional sobre Seguridad en Computación y Comunicaciones, SSCC 2020, celebrado en Chennai, India, en octubre de 2020. Debido a la pandemia de COVID-19, la conferencia se llevó a cabo en lÃnea. Los 13 artÃculos completos revisados ​​y los 8 artÃculos breves revisados ​​presentados fueron cuidadosamente revisados ​​y seleccionados entre 42 presentaciones. Los artÃculos cubren amplios campos de investigación que incluyen criptografÃa, seguridad de bases de datos y almacenamiento, aspectos humanos y sociales de la seguridad y la privacidad. Nota de contenido: Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS - Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. Tipo de medio : Computadora Summary : This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Security in Computing and Communications : 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers / [documento electrónico] / Thampi, Sabu M., ; Wang, Guojun, ; Rawat, Danda B., ; Ko, Ryan, ; Fan, Chun-I, . - 1 ed. . - Singapore [Malasia] : Springer, 2021 . - X, 305 p. 33 ilustraciones.
ISBN : 978-981-1604225--
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa Cifrado de datos (Informática) Red de computadoras Software de la aplicacion Protección de datos Red informática Sistemas informáticos CriptologÃa Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Seguridad móvil y de red Implementación de sistema informático Clasificación: 5.824 Resumen: Este libro constituye una selección revisada de artÃculos del 8.° Simposio Internacional sobre Seguridad en Computación y Comunicaciones, SSCC 2020, celebrado en Chennai, India, en octubre de 2020. Debido a la pandemia de COVID-19, la conferencia se llevó a cabo en lÃnea. Los 13 artÃculos completos revisados ​​y los 8 artÃculos breves revisados ​​presentados fueron cuidadosamente revisados ​​y seleccionados entre 42 presentaciones. Los artÃculos cubren amplios campos de investigación que incluyen criptografÃa, seguridad de bases de datos y almacenamiento, aspectos humanos y sociales de la seguridad y la privacidad. Nota de contenido: Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS - Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. Tipo de medio : Computadora Summary : This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]