• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Cyberspace Simulation and Evaluation: Third International Conference, CSE 2024, Shenzhen, China, November 26–28, 2024, Proceedings, Part II

    Cyberspace Simulation and Evaluation by Xu, Guangxia; Zhou, Wanlei; Zhang, Jiawei;

    Third International Conference, CSE 2024, Shenzhen, China, November 26–28, 2024, Proceedings, Part II

    Sorozatcím: Communications in Computer and Information Science; 2421;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár EUR 139.09
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        57 687 Ft (54 940 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 11 537 Ft off)
      • Kedvezményes ár 46 150 Ft (43 952 Ft + 5% áfa)

    57 687 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadó Springer Nature Singapore
    • Megjelenés dátuma 2025. május 6.
    • Kötetek száma 1 pieces, Book

    • ISBN 9789819645053
    • Kötéstípus Puhakötés
    • Terjedelem490 oldal
    • Méret 235x155 mm
    • Nyelv angol
    • Illusztrációk XIII, 490 p. 147 illus., 112 illus. in color. Illustrations, black & white
    • 659

    Kategóriák

    Hosszú leírás:

    This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26–28, 2024.

    The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: -

    Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario.

    Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation.

    Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.

    Több

    Tartalomjegyzék:

    .- Attack Methodology in the Evaluation .

    .- Directed Symbolic Execution Tool Based on Clang Static Analyzer: Efficient and Accurate Verification of Static Analysis Results.

    .- A Survey on Covert Network Attack.

    .- Review of Path Planning and Decision-Making in Automated Penetration Testing.

    .- Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph.

    .- A Self-evolution Attack Tree Method Based on the MDATA Model for Attack Tactics Recommendation.

    .- WFSCK: An Intelligent File System Check Recovery and Task Management Framework.

    .- Power Analysis Attack Based on Chosen-plaintext.

    .- Modeling and Assessing The Attack Behaviour of Weak Passwords Based on Attack Graph.

    .- Other Simulation and Evaluation methods.

    .- A Multispectral Pedestrian Detection Method Based on Feature Fusion.

    .- Localization of small targets in smart grain warehouse based on VAE-LSTM.

    .- Hybrid Indexing for Label-Constrained Reachability on Temporal Property Graphs.

    .- Reverse Method for DGA Based on Generative BiLSTM Model.

    .- Enhancing Cross-Domain Data Analytics through MultiSource Transfer Learning.

    .- A novel image encryption algorithm based on chaotic tent mapping.

    .- A Comparative Testing of Object Detection Model based on Adversarial Examples.

    .- Exploring Occupational Gender Bias in Large Language Models of High-Resource Language.

    .- FEDGA:FL with Dynamic Gradient and Group Normalization.

    .- Evaluation Theory and Methodology.

    .- Review of Fuzz Testing Techniques for Database Management Systems.

    .- Correlation Analysis of Tor Traffic Based on RAINBOW Scheme in Cloud Computing Environment.

    .- A hybrid framework for effective and efficient machine unlearning.

    .- Enhancing Mixnets Security: Detecting and Isolating Malicious Nodes While Forcing Adversaries into Strategic Trade-offs.

    .- Adaptive Web Crawling for Threat Intelligence Using a Reinforcement Learning-Enhanced Large Language Model.

    .- Enhancing Continuous Cognitive Diagnosis with Fuzzy Strategy-Based Hybrid Genetic Algorithm.

    .- An Attention-Based Fuzzy Logic Method for Enhancing Node Aggregations in Graph Neural Network.

    .- Defense Methodology in the Evaluation I.

    .- Privacy-preserving recommendation algorithm based on Federated Learning.

    .- YOLOv8-MING: Research on privacy fall detection algorithm based on improved YOLOv8.

    .- NetTrans: Robust Encrypted Network Traffic Analysis with Multi-modal Pre-training.

    .- Language Game for Evading Privacy Disclosure Risks via LLM-based Multi-agent Simulation.

    .- A Password Generation Scheme Excluding Personal Privacy Information.

    Több