Loading…

Ubiquitous security first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised selected papers /

This volume constitutes selected papers presented at the First International Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on securi...

Full description

Saved in:
Bibliographic Details
Corporate Authors: International Conference on Ubiquitous Security Guangzhou, China, SpringerLink (Online service)
Other Authors: Wang, Guojun (Computer scientist) (Editor), Choo, Kim-Kwang Raymond (Editor), Ko, Ryan (Editor), Xu, Yang (Associate professor of cyberspace security) (Editor), Crispo, Bruno (Editor)
Format: Conference Proceeding eBook
Language:English
Published: Singapore : Springer, 2022.
Series:Communications in computer and information science ; 1557.
Physical Description:
1 online resource (xvii, 380 pages) : illustrations (some color).
Subjects:
Online Access:SpringerLink - Click here for access

MARC

LEADER 00000cam a2200000Ii 4500
001 on1301274029
003 OCoLC
005 20230328213020.0
006 m o d
007 cr un|---aucuu
008 220302s2022 si a o 101 0 eng d
020 |a 9789811904684  |q (electronic bk.) 
020 |a 9811904685  |q (electronic bk.) 
020 |z 9789811904677  |q (print) 
024 7 |a 10.1007/978-981-19-0468-4  |2 doi 
035 |a (OCoLC)1301274029 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d EBLCP  |d OCLCO  |d OCLCF  |d OCLCO  |d UKAHL  |d OCLCQ 
049 |a COM6 
050 4 |a QA76.9.A25 
072 7 |a UB  |2 bicssc 
072 7 |a COM018000  |2 bisacsh 
072 7 |a UX  |2 thema 
082 0 4 |a 005.8  |2 23 
111 2 |a International Conference on Ubiquitous Security  |n (1st :  |d 2021 :  |c Guangzhou, China)  |0 https://id.loc.gov/authorities/names/nb2022004470. 
245 1 0 |a Ubiquitous security :  |b first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised selected papers /  |c Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo (eds.). 
246 3 |a UbiSec 2021. 
264 1 |a Singapore :  |b Springer,  |c 2022. 
300 |a 1 online resource (xvii, 380 pages) :  |b illustrations (some color). 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Communications in computer and information science,  |x 1865-0937 ;  |v 1557. 
505 0 |a A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks -- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning -- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes -- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm -- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem -- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks -- Smart Search over Encrypted Educational Resources in Cloud Storage -- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets -- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media -- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network -- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity -- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System -- Skill Reward for Safe Deep Reinforcement Learning -- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks -- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System. 
520 |a This volume constitutes selected papers presented at the First International Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks. 
500 |a Includes author index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed March 2, 2022). 
650 0 |a Computer security  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Ubiquitous computing  |v Congresses.  |0 https://id.loc.gov/authorities/subjects/sh2008113063. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Informatique omniprésente  |v Congrès. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Ubiquitous computing.  |2 fast  |0 (OCoLC)fst01160283. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
655 7 |a Conference papers and proceedings.  |2 lcgft  |0 https://id.loc.gov/authorities/genreForms/gf2014026068. 
700 1 |a Wang, Guojun  |c (Computer scientist)  |0 https://id.loc.gov/authorities/names/no2009026380  |1 https://orcid.org/0000-0001-9875-4182,  |e editor. 
700 1 |a Choo, Kim-Kwang Raymond  |0 https://id.loc.gov/authorities/names/n2008624679  |1 https://orcid.org/0000-0001-9208-5336,  |e editor. 
700 1 |a Ko, Ryan  |0 https://id.loc.gov/authorities/names/no2014069508  |1 https://orcid.org/0000-0003-0804-1176,  |e editor. 
700 1 |a Xu, Yang  |c (Associate professor of cyberspace security)  |0 (orcid)0000-0002-3194-8369  |1 https://orcid.org/0000-0002-3194-8369,  |e editor. 
700 1 |a Crispo, Bruno  |0 https://id.loc.gov/authorities/names/nb2013006521  |1 https://orcid.org/0000-0002-1252-8465,  |e editor. 
710 2 |a SpringerLink (Online service)  |0 https://id.loc.gov/authorities/names/no2005046756. 
830 0 |a Communications in computer and information science ;  |0 https://id.loc.gov/authorities/names/no2008037797  |v 1557.  |x 1865-0937. 
907 |a .b66246180  |b multi  |c -  |d 230413  |e 240321 
998 |a (2)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g si   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comprehensive, in 2024.03 
948 |a MARCIVE Comprehensive, in 2023.12 
948 |a MARCIVE Comprehensive, in 2023.05 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.12 
995 |a Loaded with m2btab.ltiac in 2023.05 
995 |a Loaded with m2btab.elec in 2023.04 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150781313  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-981-19-0468-4  |3 SpringerLink  |z Click here for access