Atnaujinkite slapukų nuostatas

El. knyga: Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.





The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:  





Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.





Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Intrusion and Anomaly Detection.- A Game Theoretical Analysis of
Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma
Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight
Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA
A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic
Identification.- POP-HIT Partially Order Preserving Hash Induced
Transformation for Privacy Protection in Face Recognition Access Control. IoT
Security.- Enhancing Cross Device Security with Fine Grained Permission
Control.- The Security Analysis of ROS2 Communication.- VET Autonomous
Vehicular Credential Verification using Trajectory and Motion
Vectors. Network Security.- A Stable Fine-grained Webpage Fingerprinting
Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel
Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.-
Visibility of Scan Traffic Trends in Sparsely Populated Darknets.- Privacy.-
Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable
Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced
Private Set Intersection Protocol over Large-scale Datasets Based on Bloom
Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak
Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving
Community Detection in Decentralized Weighted Networks.- Split Without a Leak
Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving
Reputation Aggregation System.- Program Analysis.- Analyzing Implementation
based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying
Library Functions in Stripped Binary Combining Function Similarity and Call
Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through
Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android
Ransomware Generators.- Software Security.- CV2XFuzzer C V2X Parsing
Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style
for software plagiarism detection.- Understanding and Measuring Inter Process
Code Injection in Windows Malware.