000 06030nam a22005895i 4500
001 978-3-030-71017-0
003 DE-He213
005 20220801214213.0
007 cr nn 008mamaa
008 210710s2021 sz | s |||| 0|eng d
020 _a9783030710170
_9978-3-030-71017-0
024 7 _a10.1007/978-3-030-71017-0
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aAdvances in Security, Networks, and Internet of Things
_h[electronic resource] :
_bProceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
_cedited by Kevin Daimi, Hamid R. Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXXVI, 874 p. 327 illus., 240 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTransactions on Computational Science and Computational Intelligence,
_x2569-7080
505 0 _aStatistical Analysis of Prime Number Generators Putting Encryption at Risk -- Secure Authentication Protocol for Drones in LTE Networks -- Memorable Password Generation with AES in ECB Mod -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- Suitability of Voice Recognition within the IoT Environment -- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World -- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies -- Phishing Prevention Using Defense in Depth -- Phishing Detection using Deep Learning -- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach -- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack -- Intrusion Detection through Gradient in Digraphs -- A Practice of Detecting Insider Threats within a Network -- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications -- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security -- Enhancing the Cybersecurity Education Curricula Through Quantum Computation -- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program -- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics -- A Posteriori Access Control with an Administrative Policy -- An Analysis of Applying STIR/Shaken to Prevent Robocalls -- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid -- Vulnerability Analysis of 2500 Docker Hub Images -- Analysis of Conpot and its BACnet Features for Cyber-Deception -- Automotive Vehicle Security Metrics -- Requirements for IoT Forensic Models - A Review -- Mobile Malware Forensics Review: Issues and Challenges -- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review -- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach -- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices -- Leveraging Security Management with Low-Level System Monitoring and Visualization -- Lightweight Network Steganography for Distributed Electronic Warfare System Communications -- Security of DBMSs -- Static Analysis for Software Reliability and Security.
520 _aThe book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM’20, ICWN’20, ICOMP’20 and ESCS’20.
650 0 _aTelecommunication.
_910437
650 0 _aElectronic circuits.
_919581
650 0 _aData protection.
_97245
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aElectronic Circuits and Systems.
_936947
650 2 4 _aData and Information Security.
_931990
700 1 _aDaimi, Kevin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_936948
700 1 _aArabnia, Hamid R.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_936949
700 1 _aDeligiannidis, Leonidas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_936950
700 1 _aHwang, Min-Shiang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_936951
700 1 _aTinetti, Fernando G.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_936952
710 2 _aSpringerLink (Online service)
_936953
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030710163
776 0 8 _iPrinted edition:
_z9783030710187
776 0 8 _iPrinted edition:
_z9783030710194
830 0 _aTransactions on Computational Science and Computational Intelligence,
_x2569-7080
_936954
856 4 0 _uhttps://doi.org/10.1007/978-3-030-71017-0
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76077
_d76077