• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers

    Ubiquitous Security by Wang, Guojun; Choo, Kim-Kwang Raymond; Wu, Jie; Damiani, Ernesto;

    Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers

    Sorozatcím: Communications in Computer and Information Science; 1768;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár EUR 106.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        44 374 Ft (42 261 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 8 875 Ft off)
      • Kedvezményes ár 35 499 Ft (33 809 Ft + 5% áfa)

    44 374 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Hosszú leírás:

    This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022.


    The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

    Több

    Tartalomjegyzék:

    ​Cyberspace Security.- Support Tool Selection in Digital Forensics Training.- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication.- A Hybrid Secure Two-party Protocol for Vertical Federated Learning.- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM.- CATS: A serious game in industry towards stronger cloud security.- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.- Vulnerability Detection with Representation Learning.- Assessing Vulnerability from Its Description.- Malware Traffic Classification Based on GAN and BP Neural Networks.- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications.- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning.- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study.- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection.- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning.- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety.- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA).- Android Malware Detection: A Literature Review.- Threat Modeling in Cloud Computing - A Literature Review.- A New Signal Packing Algorithm for CAN-FD with Security Consideration.- An Adversarial Sample Defense Method based on Saliency Information.- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning.- Cyberspace Privacy.- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis.- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing.- Encryption Proxies in a Confidential Computing Environment.- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.- Differentially Private Clustering Algorithm for Mixed Data.- Impact Of Reenactment Programs on Young Generation.- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning.- Cyberspace Anonymity.- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization.- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates.- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things.- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud.- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems.- Short Papers.- Garbage recognition algorithm based on self-attention mechanism and deep sorting.- Approaches for Zero Trust Adoption Based Upon Organization Security Level.- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.

    Több