Security in Computing and Communications
8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers
Series: Communications in Computer and Information Science; 1364;
- Publisher's listprice EUR 53.49
-
22 184 Ft (21 128 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 4 437 Ft off)
- Discounted price 17 748 Ft (16 902 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
22 184 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1st ed. 2021
- Publisher Springer Nature Singapore
- Date of Publication 10 February 2021
- Number of Volumes 1 pieces, Book
- ISBN 9789811604218
- Binding Paperback
- No. of pages305 pages
- Size 235x155 mm
- Weight 486 g
- Language English
- Illustrations X, 305 p. 33 illus. Illustrations, black & white 128
Categories
Long description:
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online.
The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
Table of Contents:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.- Evading Static and Dynamic Android Malware Detection Mechanisms.- Multilevel Secure Container Deployment Framework in Edge Computing.- Deep Hierarchical APP Recommendation with Dynamic Behaviors.- New Security Architecture of Access Control in 5G MEC.- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.- A Survey of Security Attacks on Silicon Based Weak PUF Architectures.- On the Feasibility of DoS Attack on Smart Door Lock IoT Network.- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning.- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection.- Thermal Management in Large Data Centres: Security Threats and Mitigation.- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm.- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data.- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm.- SaaS - Microservices-Based Scalable Smart Contract Architecture.- GIDS: Anomaly Detection Using Generative Adversarial Networks.- Audio Steganography Using Multi LSB and IGS Techniques.- A Forensic Analysis on the Availability of MQTT Network Traffic.- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.