| TÃtulo : |
Machine Learning for Cyber Security : Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Chen, Xiaofeng, ; Huang, Xinyi, ; Zhang, Jun, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XIII, 398 p. 201 ilustraciones, 90 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-30619-9 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos IngenierÃa Informática Red de computadoras Inteligencia artificial Ordenadores Seguridad de datos e información IngenierÃa Informática y Redes Entornos informáticos |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas de la Segunda Conferencia Internacional sobre Aprendizaje Automático para la Seguridad Cibernética, ML4CS 2019, celebrada en Xi''an, China, en septiembre de 2019. Los 23 artÃculos completos revisados ​​y los 3 artÃculos breves presentados fueron cuidadosamente revisados ​​y seleccionados entre 70 presentaciones. Los artÃculos detallan todos los aspectos del aprendizaje automático en la seguridad de la infraestructura de red, en las detecciones de seguridad de la red y en la seguridad del software de aplicaciones. |
| Nota de contenido: |
Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack onAndroid phones without Users' Awareness. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Machine Learning for Cyber Security : Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings [documento electrónico] / Chen, Xiaofeng, ; Huang, Xinyi, ; Zhang, Jun, . - 1 ed. . - [s.l.] : Springer, 2019 . - XIII, 398 p. 201 ilustraciones, 90 ilustraciones en color. ISBN : 978-3-030-30619-9 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos IngenierÃa Informática Red de computadoras Inteligencia artificial Ordenadores Seguridad de datos e información IngenierÃa Informática y Redes Entornos informáticos |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas de la Segunda Conferencia Internacional sobre Aprendizaje Automático para la Seguridad Cibernética, ML4CS 2019, celebrada en Xi''an, China, en septiembre de 2019. Los 23 artÃculos completos revisados ​​y los 3 artÃculos breves presentados fueron cuidadosamente revisados ​​y seleccionados entre 70 presentaciones. Los artÃculos detallan todos los aspectos del aprendizaje automático en la seguridad de la infraestructura de red, en las detecciones de seguridad de la red y en la seguridad del software de aplicaciones. |
| Nota de contenido: |
Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack onAndroid phones without Users' Awareness. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |