| TÃtulo : |
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III |
| Tipo de documento: |
documento electrónico |
| Autores: |
Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XVII, 661 p. 293 ilustraciones, 169 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-24271-8 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Inteligencia artificial Visión por computador Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. |
| Nota de contenido: |
Cloud Computing and Security -- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server -- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach -- Equipment Fault Detection Based on SENCForest -- Research on Telemedical Monitoring System Based on Homomorphic Encryption -- Phase Retrieval via Accelerated Gradient Descent -- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model -- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds -- Application of Blockchain Technology in Agricultural Product Traceability System -- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve -- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p -- Information Hiding -- An Improved Steganalysis Method Using Feature Combinations -- Research on Application of OFD Technology in Secure Electronic Bills -- A Generative Method for Image Steganography Based on Semantics -- Review on Text Watermarking Resistant to Print-scan, Screen-shooting -- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image -- IoT Security -- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement -- Multiplicative Linear Secret Sharing without Interaction -- Positioning Improvement Algorithm Based on LoRa Wireless Networks -- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks -- An Implementation of CoAP-Based Semantic Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency -- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks -- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar -- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping -- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformation -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 661 p. 293 ilustraciones, 169 ilustraciones en color. ISBN : 978-3-030-24271-8 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Inteligencia artificial Visión por computador Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. |
| Nota de contenido: |
Cloud Computing and Security -- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server -- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach -- Equipment Fault Detection Based on SENCForest -- Research on Telemedical Monitoring System Based on Homomorphic Encryption -- Phase Retrieval via Accelerated Gradient Descent -- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model -- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds -- Application of Blockchain Technology in Agricultural Product Traceability System -- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve -- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p -- Information Hiding -- An Improved Steganalysis Method Using Feature Combinations -- Research on Application of OFD Technology in Secure Electronic Bills -- A Generative Method for Image Steganography Based on Semantics -- Review on Text Watermarking Resistant to Print-scan, Screen-shooting -- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image -- IoT Security -- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement -- Multiplicative Linear Secret Sharing without Interaction -- Positioning Improvement Algorithm Based on LoRa Wireless Networks -- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks -- An Implementation of CoAP-Based Semantic Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency -- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks -- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar -- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping -- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformation -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |