Loading…
Ubiquitous security first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised selected papers /
This volume constitutes selected papers presented at the First International Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on securi...
Saved in:
Corporate Authors: | , |
---|---|
Other Authors: | , , , , |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Singapore :
Springer,
2022.
|
Series: | Communications in computer and information science ;
1557. |
Physical Description: |
1 online resource (xvii, 380 pages) : illustrations (some color). |
Subjects: | |
Online Access: | SpringerLink - Click here for access |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | on1301274029 | ||
003 | OCoLC | ||
005 | 20230328213020.0 | ||
006 | m o d | ||
007 | cr un|---aucuu | ||
008 | 220302s2022 si a o 101 0 eng d | ||
020 | |a 9789811904684 |q (electronic bk.) | ||
020 | |a 9811904685 |q (electronic bk.) | ||
020 | |z 9789811904677 |q (print) | ||
024 | 7 | |a 10.1007/978-981-19-0468-4 |2 doi | |
035 | |a (OCoLC)1301274029 | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d EBLCP |d OCLCO |d OCLCF |d OCLCO |d UKAHL |d OCLCQ | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UB |2 bicssc | |
072 | 7 | |a COM018000 |2 bisacsh | |
072 | 7 | |a UX |2 thema | |
082 | 0 | 4 | |a 005.8 |2 23 |
111 | 2 | |a International Conference on Ubiquitous Security |n (1st : |d 2021 : |c Guangzhou, China) |0 https://id.loc.gov/authorities/names/nb2022004470. | |
245 | 1 | 0 | |a Ubiquitous security : |b first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised selected papers / |c Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo (eds.). |
246 | 3 | |a UbiSec 2021. | |
264 | 1 | |a Singapore : |b Springer, |c 2022. | |
300 | |a 1 online resource (xvii, 380 pages) : |b illustrations (some color). | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Communications in computer and information science, |x 1865-0937 ; |v 1557. | |
505 | 0 | |a A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks -- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning -- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes -- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm -- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem -- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks -- Smart Search over Encrypted Educational Resources in Cloud Storage -- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets -- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media -- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network -- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity -- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System -- Skill Reward for Safe Deep Reinforcement Learning -- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks -- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System. | |
520 | |a This volume constitutes selected papers presented at the First International Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks. | ||
500 | |a Includes author index. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed March 2, 2022). | |
650 | 0 | |a Computer security |v Congresses. |0 https://id.loc.gov/authorities/subjects/sh2008101458. | |
650 | 0 | |a Ubiquitous computing |v Congresses. |0 https://id.loc.gov/authorities/subjects/sh2008113063. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Informatique omniprésente |v Congrès. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Ubiquitous computing. |2 fast |0 (OCoLC)fst01160283. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft |0 https://id.loc.gov/authorities/genreForms/gf2014026068. | |
700 | 1 | |a Wang, Guojun |c (Computer scientist) |0 https://id.loc.gov/authorities/names/no2009026380 |1 https://orcid.org/0000-0001-9875-4182, |e editor. | |
700 | 1 | |a Choo, Kim-Kwang Raymond |0 https://id.loc.gov/authorities/names/n2008624679 |1 https://orcid.org/0000-0001-9208-5336, |e editor. | |
700 | 1 | |a Ko, Ryan |0 https://id.loc.gov/authorities/names/no2014069508 |1 https://orcid.org/0000-0003-0804-1176, |e editor. | |
700 | 1 | |a Xu, Yang |c (Associate professor of cyberspace security) |0 (orcid)0000-0002-3194-8369 |1 https://orcid.org/0000-0002-3194-8369, |e editor. | |
700 | 1 | |a Crispo, Bruno |0 https://id.loc.gov/authorities/names/nb2013006521 |1 https://orcid.org/0000-0002-1252-8465, |e editor. | |
710 | 2 | |a SpringerLink (Online service) |0 https://id.loc.gov/authorities/names/no2005046756. | |
830 | 0 | |a Communications in computer and information science ; |0 https://id.loc.gov/authorities/names/no2008037797 |v 1557. |x 1865-0937. | |
907 | |a .b66246180 |b multi |c - |d 230413 |e 240321 | ||
998 | |a (2)cue |a cu |b 240227 |c m |d z |e - |f eng |g si |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comprehensive, in 2024.03 | ||
948 | |a MARCIVE Comprehensive, in 2023.12 | ||
948 | |a MARCIVE Comprehensive, in 2023.05 | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2023.12 | ||
995 | |a Loaded with m2btab.ltiac in 2023.05 | ||
995 | |a Loaded with m2btab.elec in 2023.04 | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150781313 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-981-19-0468-4 |3 SpringerLink |z Click here for access |