000 05725nam a22006375i 4500
001 978-3-031-45933-7
003 DE-He213
005 20240730202732.0
007 cr nn 008mamaa
008 231120s2023 sz | s |||| 0|eng d
020 _a9783031459337
_9978-3-031-45933-7
024 7 _a10.1007/978-3-031-45933-7
_2doi
050 4 _aQA75.5-76.95
072 7 _aUNH
_2bicssc
072 7 _aUND
_2bicssc
072 7 _aCOM030000
_2bisacsh
072 7 _aUNH
_2thema
072 7 _aUND
_2thema
082 0 4 _a025.04
_223
245 1 0 _aScience of Cyber Security
_h[electronic resource] :
_b5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings /
_cedited by Moti Yung, Chao Chen, Weizhi Meng.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXIV, 526 p. 164 illus., 118 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14299
505 0 _aSession 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model's Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11-14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching.
650 0 _aInformation storage and retrieval systems.
_922213
650 0 _aDatabase management.
_93157
650 0 _aData mining.
_93907
650 0 _aMachine learning.
_91831
650 0 _aApplication software.
_9172786
650 1 4 _aInformation Storage and Retrieval.
_923927
650 2 4 _aDatabase Management.
_93157
650 2 4 _aData Mining and Knowledge Discovery.
_9172787
650 2 4 _aMachine Learning.
_91831
650 2 4 _aComputer and Information Systems Applications.
_9172788
700 1 _aYung, Moti.
_eeditor.
_0(orcid)
_10000-0003-0848-0873
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9172789
700 1 _aChen, Chao.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9172790
700 1 _aMeng, Weizhi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9172791
710 2 _aSpringerLink (Online service)
_9172792
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031459320
776 0 8 _iPrinted edition:
_z9783031459344
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14299
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-45933-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c97152
_d97152