| TÃtulo : |
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV |
| Tipo de documento: |
documento electrónico |
| Autores: |
Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XVII, 651 p. 252 ilustraciones, 134 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-24268-8 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos CriptografÃa Cifrado de datos (Informática) Red de computadoras Software de la aplicacion IngenierÃa de software Ordenador TecnologÃa de la información Seguridad de datos e información CriptologÃa Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. |
| Nota de contenido: |
Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on CompositeBoolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGAEnhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 651 p. 252 ilustraciones, 134 ilustraciones en color. ISBN : 978-3-030-24268-8 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos CriptografÃa Cifrado de datos (Informática) Red de computadoras Software de la aplicacion IngenierÃa de software Ordenador TecnologÃa de la información Seguridad de datos e información CriptologÃa Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. |
| Nota de contenido: |
Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on CompositeBoolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGAEnhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |