My Account Log in

1 option

Science of Cyber Security : 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers / edited by Chunhua Su, Kouichi Sakurai, Feng Liu.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Sakurai, Kouichi, editor.
Liu, Feng, editor.
Su, Chunhua, editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13580
Language:
English
Subjects (All):
Data protection.
Data and Information Security.
Local Subjects:
Data and Information Security.
Physical Description:
1 online resource (575 pages)
Edition:
1st ed. 2022.
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
Summary:
This book constitutes the proceedings of the 4th International Conference on Science of Cyber Security, SciSec 2022, held in Matsu, Japan in August 2022. The 36 full papers presented in this volume were carefully reviewed and selected from 88 submissions. The papers are organized in the following topical sections: blockchain and applications; cryptography and applications; network security; cyber-physical system; malware; mobile system security; system and web security; security in financial industry; social engineering and personalized security; privacy and anonymity.
Contents:
Blockchain and Applications
ChainSCAN: A Blockchain-based Supply Chain Alerting Framework for Food Safety
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain
Adapted PBFT Consensus Protocol for Sharded Blockchain
A Practical Blockchain-based Maintenance Record System for Better Aircraft Security
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback
Cryptography and Applications
Pitch in: A Secure Extension Signature based on SM9
Verifiable DOPE from Semi-homomorphic Encryption, and the Extension to DOT
Scalable M+1st-Price Auction with Infinite Bidding Price
The Shared Memory based Cryptographic Card Virtualization
Network Security
Feature Transfer based Network Anomaly Detection
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN
AtNet: A Novel Anti-tracking Network with Multi-party JudgementCapability based on Cross-domain Small-world Topology
A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection
Analysis and Detection against Overlapping Phenomenon of Behavioral Attribute in Network Attacks
Integration of Cybersecurity related Development Processes by using a Quantification Method
Cyber-Physical System
ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems
Malware
Malware Classification Based on Semi-Supervised Learning
Malware detected and tell me why: An verifiable malware detection model with graph metric learning
Malware Detection using Automated Generation of Yara rules on Dynamic Features
Mobile System Security
Question Answering Models For Privacy Policies of Mobile Apps: Are We There Yet?
Design of End-to-End Security for MQTT 5.0
DroidFP: A Zero-Permission Detection Framework for Android Device Based on Gated Recurrent Unit
System and Web Security
An Intrusion Detection System based on Deep Belief Networks
HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains
AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series
BASNEA: Threat Hunting for Ethereum Smart Contract based on Backtrackless Aligned-Spatial Network Entity Alignment
Multi-region SRAM-Based TCAM for Longest Prefix
Security in Financial Industry
A solution for the offline double-spending issue of digital currencies
A Hierarchical Macroeconomic Copula Model for Cyber Damages based on current Cyber Insurance Prices
Social Engineering and Personalized Security
Cyber Social Engineering Kill Chain
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement
Privacy and Anonymity
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps
A k-anonymity-based Robust Watermarking Scheme for Relational Database.
Notes:
Includes bibliographical references and index.
Other Format:
Print version: Su, Chunhua Science of Cyber Security
ISBN:
9783031175510
3031175514

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account