Atnaujinkite slapukų nuostatas

El. knyga: Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 13, 2023. The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity









 
Cyberspace Security.- Bilateral Personalized Information Fusion in
Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through
Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in
Binary Similarity Systems.- How does post-quantum cryptography affect Central
Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum
using Ternary Classification Model.- A Comprehensive Survey of Attack
Techniques, Implementation, and Mitigation Strategies in Large Language
Models.- Process Mining with Programmable Logic ControllerMemory
States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving
DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying
Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD:
Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP
in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated
Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional
Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer
Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A
Machine Learning-based Detection Method for Interest Flooding Attacks in
VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of
privacy data in service cooperation.- Privacy-preserving Blockchain-based
Traceability System with Decentralized Ciphertext-Policy Attribute-based
Encryption.- A Probability Mapping-Based Privacy Preservation Method for
Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection
of Cyberbullying in Social Media Texts Using Explainable Artificial
Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep
Learning.- Research on Authorization Model of Attribute Access Control Based
on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward
Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for
Data Storage and Query Processing.- Is it Really You Who Forgot the Password?
When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge
Graph to Permit Interoperability of Heterogeneous Digital Evidence.-
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for
Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32
Binaries Using Architecture Features.