| TÃtulo : |
12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XVI, 506 p. 317 ilustraciones, 142 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-24907-6 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Ordenadores Red de computadoras IngenierÃa Informática Inteligencia artificial Seguridad de datos e información Entornos informáticos Redes de comunicación informática IngenierÃa Informática y Redes |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2019, celebrada en Atlanta, GA, EE. UU., en julio de 2019. Los 37 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados de 109 presentaciones. Los artÃculos cubren muchas dimensiones, incluidos algoritmos y arquitecturas de seguridad, polÃticas, regulaciones y técnicas conscientes de la privacidad, computación y comunicación anónimas, abarcando enfoques teóricos fundamentales, proyectos experimentales prácticos y sistemas de aplicaciones comerciales para computación, comunicación y almacenamiento. |
| Nota de contenido: |
Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings [documento electrónico] / Wang, Guojun, ; Feng, Jun, ; Bhuiyan, MD Zakirul Alam, ; Lu, Rongxing, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVI, 506 p. 317 ilustraciones, 142 ilustraciones en color. ISBN : 978-3-030-24907-6 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Ordenadores Red de computadoras IngenierÃa Informática Inteligencia artificial Seguridad de datos e información Entornos informáticos Redes de comunicación informática IngenierÃa Informática y Redes |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 12.ª Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2019, celebrada en Atlanta, GA, EE. UU., en julio de 2019. Los 37 artÃculos completos fueron cuidadosamente revisados ​​y seleccionados de 109 presentaciones. Los artÃculos cubren muchas dimensiones, incluidos algoritmos y arquitecturas de seguridad, polÃticas, regulaciones y técnicas conscientes de la privacidad, computación y comunicación anónimas, abarcando enfoques teóricos fundamentales, proyectos experimentales prácticos y sistemas de aplicaciones comerciales para computación, comunicación y almacenamiento. |
| Nota de contenido: |
Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |