| TÃtulo : |
7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II |
| Tipo de documento: |
documento electrónico |
| Autores: |
Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XXIII, 753 p. 353 ilustraciones, 246 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-78612-0 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Software de la aplicacion IngenierÃa Informática Red de computadoras Protección de datos Inteligencia artificial CriptografÃa Cifrado de datos (Informática) Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes Seguridad de datos e información CriptologÃa |
| Ãndice Dewey: |
005.3 Ciencia de los computadores (Programas) |
| Resumen: |
Este conjunto de dos volúmenes de LNCS 12736-12737 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 93 artÃculos completos y 29 artÃculos breves presentados en estas actas de dos volúmenes fue cuidadosamente revisado y seleccionado entre 1013 presentaciones. En total, se aceptaron un total de 224 artÃculos completos y 81 artÃculos breves para ICAIS 2021; los demás artÃculos aceptados se presentan en CCIS 1422-1424. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Inteligencia artificial; y big data Parte II: Big data; computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; seguridad de la IoT; y análisis forense multimedia. |
| Nota de contenido: |
Big Data -- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform -- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis -- Exploring the informationization of Land Reserve Archives Management -- Research and Implementation of Anomaly Detection Algorithm in Data Mining -- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction -- Design and Implementation of Data Adapter in SWIM -- Cloud Computing and Security -- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking -- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing -- A Computing Task Offloading Scheme for Mobile Edge Computing -- Security Transmission Scheme of Sensitive Data for Mobile Terminal -- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain -- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring -- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network -- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature -- Detection of Virtual Machines based on Thread Scheduling -- Graph Attention Network for Word Embeddings -- Firewall Filtering Technology And Application Based On Decision Tree -- Encryption and Cybersecurity -- A DAPP business data storage model based on blockchain and IPFS -- IPv6-Darknet Network Traffic Detection -- Neural Control Based Research of Endogenous Security Model -- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes -- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy -- A transaction model of bill service based on blockchain -- An N-gram Based Deep Learning Method for Network Traffic Classification -- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning -- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture -- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain -- Information Hiding -- Covert Communication via Modulating Soft Label of Neural Network -- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography -- Halftone Image Steganography Based on Reassigned Distortion Measurement -- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units -- High efficiency quantum image steganography protocol based on ZZW framework -- Halftone Image Steganalysis by Reconstructing Grayscale Image -- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition -- Research and Implementation of Medical Information Protection and Sharing based on Blockchain -- IoT Security -- LoRa Network Security Schemes Based on RF Fingerprint -- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living -- Blockchain-based reliable collection mechanism for smart meter quality data -- Power Blockchain Guarantee Mechanism Based on Trusted Computing -- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol -- Sensor Failure Detection Based on Programmable Switch and Machine Learning -- A Solution to Reduce Broadcast Storm in VANET -- a Vehicle Intrusion Detection System Based on Time Interval and Data Field -- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption -- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections -- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA -- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments -- Security analysis of measurement automation system based on threat intelligence -- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network -- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning -- Recent Development, Trends and Challenges in IoT Security -- Energy Optimization for Wild Animal Tracker basing on watchdog technology -- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction -- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength -- Wi-Fi Indoor Positioning Using D-S Evidence Theory -- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System -- Multimedia Forensics -- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain -- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method -- A Fast Tongue Image Color Correction Method Based on Gray World Method -- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXIII, 753 p. 353 ilustraciones, 246 ilustraciones en color. ISBN : 978-3-030-78612-0 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Software de la aplicacion IngenierÃa Informática Red de computadoras Protección de datos Inteligencia artificial CriptografÃa Cifrado de datos (Informática) Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes Seguridad de datos e información CriptologÃa |
| Ãndice Dewey: |
005.3 Ciencia de los computadores (Programas) |
| Resumen: |
Este conjunto de dos volúmenes de LNCS 12736-12737 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 93 artÃculos completos y 29 artÃculos breves presentados en estas actas de dos volúmenes fue cuidadosamente revisado y seleccionado entre 1013 presentaciones. En total, se aceptaron un total de 224 artÃculos completos y 81 artÃculos breves para ICAIS 2021; los demás artÃculos aceptados se presentan en CCIS 1422-1424. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Inteligencia artificial; y big data Parte II: Big data; computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; seguridad de la IoT; y análisis forense multimedia. |
| Nota de contenido: |
Big Data -- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform -- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis -- Exploring the informationization of Land Reserve Archives Management -- Research and Implementation of Anomaly Detection Algorithm in Data Mining -- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction -- Design and Implementation of Data Adapter in SWIM -- Cloud Computing and Security -- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking -- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing -- A Computing Task Offloading Scheme for Mobile Edge Computing -- Security Transmission Scheme of Sensitive Data for Mobile Terminal -- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain -- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring -- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network -- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature -- Detection of Virtual Machines based on Thread Scheduling -- Graph Attention Network for Word Embeddings -- Firewall Filtering Technology And Application Based On Decision Tree -- Encryption and Cybersecurity -- A DAPP business data storage model based on blockchain and IPFS -- IPv6-Darknet Network Traffic Detection -- Neural Control Based Research of Endogenous Security Model -- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes -- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy -- A transaction model of bill service based on blockchain -- An N-gram Based Deep Learning Method for Network Traffic Classification -- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning -- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture -- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain -- Information Hiding -- Covert Communication via Modulating Soft Label of Neural Network -- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography -- Halftone Image Steganography Based on Reassigned Distortion Measurement -- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units -- High efficiency quantum image steganography protocol based on ZZW framework -- Halftone Image Steganalysis by Reconstructing Grayscale Image -- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition -- Research and Implementation of Medical Information Protection and Sharing based on Blockchain -- IoT Security -- LoRa Network Security Schemes Based on RF Fingerprint -- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living -- Blockchain-based reliable collection mechanism for smart meter quality data -- Power Blockchain Guarantee Mechanism Based on Trusted Computing -- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol -- Sensor Failure Detection Based on Programmable Switch and Machine Learning -- A Solution to Reduce Broadcast Storm in VANET -- a Vehicle Intrusion Detection System Based on Time Interval and Data Field -- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption -- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections -- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA -- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments -- Security analysis of measurement automation system based on threat intelligence -- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network -- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning -- Recent Development, Trends and Challenges in IoT Security -- Energy Optimization for Wild Animal Tracker basing on watchdog technology -- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction -- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength -- Wi-Fi Indoor Positioning Using D-S Evidence Theory -- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System -- Multimedia Forensics -- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain -- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method -- A Fast Tongue Image Color Correction Method Based on Gray World Method -- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |