Foundations and Practice of Security
Springer International Publishing (Verlag)
978-3-030-45370-1 (ISBN)
The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.
Machine Learning Approaches.- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks.- Ransomware Network Traffic Analysis for Pre-Encryption Alert.- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.- Selection and performance analysis of CICIDS2017 features importance.- Semantic Representation Based on Deep Learning for Spam Detection.- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.- Labelled Network Capture Generation For Anomaly Detection.- Attack Prevention and Trustworthiness.- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS.- Secure Logging with Security against Adaptive Crash Attack.- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience.- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.- Protecting Android Apps from Repackaging Using Native Code.- Access Control Models and Cryptography.- Command Dependencies in Heuristic Safety Analysis of Access Control Models.- On Attribute Retrieval in ABAC.- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control.- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.- An Efficient Identification Scheme Based on Rank Metric.- Security Analysis of Auctionity: a blockchain based e-auction.- Dynamic Searchable Encryption with Access Control.- Short Papers.- Get-your-ID: Decentralized Proof of Identity.- Towards secure TMIS protocols.- Detecting Ransomware in Encrypted Web Traffic.- Digital forensics in vessel transportation systems.- A Privacy Protection Layer for Wearable Devices.- Validating the DFA Attack Resistance of AES.- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications.- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History.- Towards Privacy-Aware Smart Surveillance.
| Erscheinungsdatum | 05.04.2020 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 408 p. 153 illus., 68 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 646 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Access Control • Applications • Artificial Intelligence • authentication • computer crime • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Data communication systems • Data Security • Informatics • machine learning • Network Protocols • Network Security • network traffic analysis • Ransomware • Research • security analysis • Security Systems |
| ISBN-10 | 3-030-45370-7 / 3030453707 |
| ISBN-13 | 978-3-030-45370-1 / 9783030453701 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich