000 05779nam a22006495i 4500
001 978-3-030-24900-7
003 DE-He213
005 20240730171741.0
007 cr nn 008mamaa
008 190710s2019 sz | s |||| 0|eng d
020 _a9783030249007
_9978-3-030-24900-7
024 7 _a10.1007/978-3-030-24900-7
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage
_h[electronic resource] :
_bSpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings /
_cedited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXV, 332 p. 127 illus., 97 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v11637
505 0 _aThe 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive OperationalModal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers.
520 _aThis book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 - Security and Privacy of Internet of Things; TSP 2019 - Trust, Security and Privacy for Emerging Applications; SCS 2019 - Sensor-Cloud Systems; UbiSafe 2019 - UbiSafe Computing; ISSR 2019 - Security in e-Science and e-Research; CMRM 2019 - Cybersecurity Metrics and Risk Modeling.
650 0 _aData protection.
_97245
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aComputer vision.
_9100238
650 0 _aArtificial intelligence.
_93407
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Engineering and Networks.
_9100240
650 2 4 _aComputer Communication Networks.
_9100242
650 2 4 _aComputer Vision.
_9100243
650 2 4 _aArtificial Intelligence.
_93407
700 1 _aWang, Guojun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100246
700 1 _aFeng, Jun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100248
700 1 _aBhuiyan, Md Zakirul Alam.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100249
700 1 _aLu, Rongxing.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100251
710 2 _aSpringerLink (Online service)
_9100253
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030248994
776 0 8 _iPrinted edition:
_z9783030249014
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v11637
_9100254
856 4 0 _uhttps://doi.org/10.1007/978-3-030-24900-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c87794
_d87794