Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Security and Privacy -

Information Security and Privacy

29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III

Tianqing Zhu, Yannan Li (Herausgeber)

Buch | Softcover
464 Seiten
2024 | 2024 ed.
Springer Verlag, Singapore
978-981-97-5100-6 (ISBN)
CHF 224,65 inkl. MwSt
  • Versand in 10-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security.

This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024. 

The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security. 

Blockchain Technology.- Enhancing Permissioned Blockchains with Controlled Data Authorization.- FXChain a multi consortium blockchain with flexible privacy preserving strategies.- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation.- CrossAAD Cross-chain Abnormal Account Detection.- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing.- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring.- Privacy Enhancing Technologies.- Understanding Privacy in Smart Speakers A Narrative Review.- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System.- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration.- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure.- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications.- System Security.- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection.- Security Research for Android Remote Assistance Apps.- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting.- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems.- Action Driven UAV Fingerprint Verification with Perception Data.- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes.- Network Security.- FSAM Framework for Online CDN based Website Classification.- Towards Private Multi-Operator Network Slicing.- AI Security.- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network.- PassTSL Modeling Human Created Passwords through Two Stage Learning.- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models.- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo 116 Illustrations, color; 20 Illustrations, black and white
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Applications • Computer Science • conference proceedings • Informatics • Research
ISBN-10 981-97-5100-4 / 9819751004
ISBN-13 978-981-97-5100-6 / 9789819751006
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95