000 05934nam a22006615i 4500
001 978-3-031-45933-7
003 DE-He213
005 20240207153751.0
007 cr nn 008mamaa
008 231120s2023 sz | s |||| 0|eng d
020 _a9783031459337
_9978-3-031-45933-7
050 4 _aQA75.5-76.95
072 7 _aUNH
_2bicssc
072 7 _aUND
_2bicssc
072 7 _aCOM030000
_2bisacsh
072 7 _aUNH
_2thema
072 7 _aUND
_2thema
082 0 4 _a025.04
_223
245 1 0 _aScience of Cyber Security
_h[electronic resource] :
_b5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings /
_cedited by Moti Yung, Chao Chen, Weizhi Meng.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXIV, 526 p. 164 illus., 118 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14299
500 _aAcceso multiusuario
505 0 _aSession 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model's Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11-14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching.
541 _fUABC ;
_cPerpetuidad
650 0 _aInformation storage and retrieval systems.
650 0 _aDatabase management.
650 0 _aData mining.
650 0 _aMachine learning.
650 0 _aApplication software.
650 1 4 _aInformation Storage and Retrieval.
650 2 4 _aDatabase Management.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aMachine Learning.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aYung, Moti.
_eeditor.
_0(orcid)0000-0003-0848-0873
_1https://orcid.org/0000-0003-0848-0873
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aChen, Chao.
_eeditor.
_0(orcid)0000-0003-1355-3870
_1https://orcid.org/0000-0003-1355-3870
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMeng, Weizhi.
_eeditor.
_0(orcid)0000-0003-4384-5786
_1https://orcid.org/0000-0003-4384-5786
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031459320
776 0 8 _iPrinted edition:
_z9783031459344
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14299
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-45933-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cLIBRO_ELEC
999 _c263322
_d263321