Science of Cyber Security (Record no. 97152)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05725nam a22006375i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-45933-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730202732.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231120s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031459337 |
-- | 978-3-031-45933-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-45933-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA75.5-76.95 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UNH |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UND |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM030000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UNH |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UND |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 025.04 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Science of Cyber Security |
Medium | [electronic resource] : |
Remainder of title | 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings / |
Statement of responsibility, etc. | edited by Moti Yung, Chao Chen, Weizhi Meng. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer Nature Switzerland : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 526 p. 164 illus., 118 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume/sequential designation | 14299 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model's Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11-14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information storage and retrieval systems. |
9 (RLIN) | 22213 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Database management. |
9 (RLIN) | 3157 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data mining. |
9 (RLIN) | 3907 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Machine learning. |
9 (RLIN) | 1831 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Application software. |
9 (RLIN) | 172786 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information Storage and Retrieval. |
9 (RLIN) | 23927 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Database Management. |
9 (RLIN) | 3157 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data Mining and Knowledge Discovery. |
9 (RLIN) | 172787 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Machine Learning. |
9 (RLIN) | 1831 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer and Information Systems Applications. |
9 (RLIN) | 172788 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Yung, Moti. |
Relator term | editor. |
Authority record control number or standard number | (orcid) |
Real World Object URI | 0000-0003-0848-0873 |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 172789 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chen, Chao. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 172790 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Meng, Weizhi. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 172791 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 172792 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783031459320 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783031459344 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume/sequential designation | 14299 |
9 (RLIN) | 23263 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-45933-7">https://doi.org/10.1007/978-3-031-45933-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.