|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Mirosław Kutyłowski , Jun Zhang , Chao ChenPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2020 Volume: 12570 Weight: 0.706kg ISBN: 9783030657444ISBN 10: 3030657442 Pages: 448 Publication Date: 19 December 2020 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsData Analytics of Crowdsourced Resources for Cybersecurity Intelligence.- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets.- EnCoD Distinguishing Compressed and Encrypted File Fragments.- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models.- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication.- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives.- Defending Against Package Typosquatting.- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network.- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack.- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging.- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher.- Model Poisoning Defense on Federated Learning: A Validation Based Approach.- Fixing Vulnerabilities Automatically with Linters.- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay.- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection.- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties.- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality.- A Model Specification Implementation for Trust Negotiation.- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations.- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences.- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks.- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection.- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System.- The Impact of Differential Privacy on Model Fairness in Federated Learning.- Evading Stepping-Stone Detection with Enough Chaff.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |