| TÃtulo : |
SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XV, 332 p. 127 ilustraciones, 97 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-24900-7 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos IngenierÃa Informática Red de computadoras Visión por computador Inteligencia artificial Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de seis simposios y dos talleres ubicados conjuntamente con SpaCCS 2019, la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento. Los 26 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 75 presentaciones. Los simposios y talleres de este año son: SPIoT 2019 – Seguridad y Privacidad del Internet de las Cosas; TSP 2019 – Confianza, seguridad y privacidad para aplicaciones emergentes; SCS 2019 – Sistemas de sensores en la nube; UbiSafe 2019 – Computación UbiSafe; ISSR 2019 – Seguridad en la e-Ciencia y la e-Investigación; CMRM 2019 – Métricas de Ciberseguridad y Modelado de Riesgos. |
| Nota de contenido: |
The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive OperationalModal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings [documento electrónico] / Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, . - 1 ed. . - [s.l.] : Springer, 2019 . - XV, 332 p. 127 ilustraciones, 97 ilustraciones en color. ISBN : 978-3-030-24900-7 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos IngenierÃa Informática Red de computadoras Visión por computador Inteligencia artificial Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de seis simposios y dos talleres ubicados conjuntamente con SpaCCS 2019, la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento. Los 26 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados entre 75 presentaciones. Los simposios y talleres de este año son: SPIoT 2019 – Seguridad y Privacidad del Internet de las Cosas; TSP 2019 – Confianza, seguridad y privacidad para aplicaciones emergentes; SCS 2019 – Sistemas de sensores en la nube; UbiSafe 2019 – Computación UbiSafe; ISSR 2019 – Seguridad en la e-Ciencia y la e-Investigación; CMRM 2019 – Métricas de Ciberseguridad y Modelado de Riesgos. |
| Nota de contenido: |
The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive OperationalModal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |