|
|
|||
|
||||
OverviewThis two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security. Full Product DetailsAuthor: Haixin Duan , Mourad Debbabi , Xavier de Carné de Carnavalet , Xiapu LuoPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 2024 ed. Volume: 568 ISBN: 9783031649530ISBN 10: 3031649532 Pages: 517 Publication Date: 22 November 2024 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsIntrusion and Anomaly Detection.- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification.- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security.- Enhancing Cross Device Security with Fine Grained Permission Control.- The Security Analysis of ROS2 Communication.- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security.- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.- Visibility of Scan Traffic Trends in Sparsely Populated Darknets.- Privacy.- Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks.- Split Without a Leak Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving Reputation Aggregation System.- Program Analysis.- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android Ransomware Generators.- Software Security.- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style for software plagiarism detection.- Understanding and Measuring Inter Process Code Injection in Windows Malware.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |