Muutke küpsiste eelistusi

E-raamat: Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 92,01 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 13, 2023. The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity









 
Cyberspace Security.- Bilateral Personalized Information Fusion in
Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through
Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in
Binary Similarity Systems.- How does post-quantum cryptography affect Central
Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum
using Ternary Classification Model.- A Comprehensive Survey of Attack
Techniques, Implementation, and Mitigation Strategies in Large Language
Models.- Process Mining with Programmable Logic ControllerMemory
States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving
DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying
Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD:
Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP
in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated
Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional
Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer
Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A
Machine Learning-based Detection Method for Interest Flooding Attacks in
VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of
privacy data in service cooperation.- Privacy-preserving Blockchain-based
Traceability System with Decentralized Ciphertext-Policy Attribute-based
Encryption.- A Probability Mapping-Based Privacy Preservation Method for
Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection
of Cyberbullying in Social Media Texts Using Explainable Artificial
Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep
Learning.- Research on Authorization Model of Attribute Access Control Based
on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward
Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for
Data Storage and Query Processing.- Is it Really You Who Forgot the Password?
When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge
Graph to Permit Interoperability of Heterogeneous Digital Evidence.-
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for
Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32
Binaries Using Architecture Features.