000 | 04052nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-030-94029-4 | ||
003 | DE-He213 | ||
005 | 20240730181127.0 | ||
007 | cr nn 008mamaa | ||
008 | 220111s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030940294 _9978-3-030-94029-4 |
||
024 | 7 |
_a10.1007/978-3-030-94029-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyberspace Safety and Security _h[electronic resource] : _b13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings / _cedited by Weizhi Meng, Mauro Conti. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aX, 217 p. 57 illus., 34 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13172 |
|
505 | 0 | _aEncrypted Malicious Traffic Detection Based on Ensemble Learning -- A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks -- Dissecting Membership Inference Risk in Machine Learning -- Webshell Detection Based on Explicit Duration Recurrent Network -- A Practical Botnet Traffic Detection System using GNN -- Vulnerability and Transaction behavior based detection of Malicious Smart Contracts -- A novel method of template protection and two-factor authentication protocol based on biometric and PUF -- Realizing Information Flow Control in ABAC Mining -- Weak Password Scanning System for Penetration Testing -- Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases -- A Privacy-Preserving Logistics Information System with Traceability -- Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain -- Flexible and Survivable Single Sign-On -- The Analysis and Implication of Data Deduplication in Digital Forensics. | |
520 | _aThe LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021. The 9 full papers and 5 short papers presented in this book were carefully reviewed and selected from 35 submissions. The conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9123520 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _9123521 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer Communication Networks. _9123522 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9123523 |
700 | 1 |
_aMeng, Weizhi. _eeditor. _0(orcid) _10000-0003-4384-5786 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123524 |
|
700 | 1 |
_aConti, Mauro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123525 |
|
710 | 2 |
_aSpringerLink (Online service) _9123526 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030940287 |
776 | 0 | 8 |
_iPrinted edition: _z9783030940300 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13172 _9123527 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-94029-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90710 _d90710 |