Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1–3, 2023.
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity



 

1144752399
Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1–3, 2023.
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity



 

89.0 In Stock
Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

eBook2024 (2024)

$89.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1–3, 2023.
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity



 


Product Details

ISBN-13: 9789819712748
Publisher: Springer-Verlag New York, LLC
Publication date: 03/12/2024
Series: Communications in Computer and Information Science , #2034
Sold by: Barnes & Noble
Format: eBook
File size: 45 MB
Note: This product may take a few minutes to download.

Table of Contents

Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
From the B&N Reads Blog

Customer Reviews