語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy in social netwo...
~
(1998 :)
Security and privacy in social networks and big data5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security and privacy in social networks and big dataedited by Weizhi Meng, Steven Furnell.
其他題名:
5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019 : revised selected papers /
其他題名:
SocialSec 2019
其他作者:
Meng, Weizhi.
團體作者:
出版者:
Singapore :Springer Singapore :2019.
面頁冊數:
xii, 276 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
標題:
Online social networksCongresses.Security measures
電子資源:
https://doi.org/10.1007/978-981-15-0758-8
ISBN:
9789811507588$q(electronic bk.)
Security and privacy in social networks and big data5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019 : revised selected papers /
Security and privacy in social networks and big data
5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019 : revised selected papers /[electronic resource] :SocialSec 2019edited by Weizhi Meng, Steven Furnell. - Singapore :Springer Singapore :2019. - xii, 276 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,10951865-0929 ;. - Communications in computer and information science ;229..
Web Scanner Detection Based on Behavioral Differences -- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation -- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing -- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network -- Development of an Early Warning System for Network Intrusion Detection using Benford's Law Features -- An RTP Extension for Reliable User-data Transmission over VoIP Traffic -- A Hybrid Covert Channel with Feedback over Mobile Networks -- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things -- Integer Version of Ring-LWE and its Applications -- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart devices: A case study -- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu -- Online Event Detection in Social Media with Bursty Event Recognition -- Predicting Users' Emotional Intelligence with Social Networking Data -- Design and Implementation of Medical Dispute Governance Based on Blockchain -- Greedily Remove k links to hide important individuals in social network -- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System -- Blockchain-based Threshold Electronic Voting System -- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication -- Learning from Imbalanced Data: A Comparative Study.
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
ISBN: 9789811507588$q(electronic bk.)
Standard No.: 10.1007/978-981-15-0758-8doiSubjects--Topical Terms:
853526
Online social networks
--Security measures--Congresses.
LC Class. No.: TK5105.8855 / .I58 2019
Dewey Class. No.: 025.042
Security and privacy in social networks and big data5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019 : revised selected papers /
LDR
:03347nmm a2200349 a 4500
001
567906
003
DE-He213
005
20191026102353.0
006
m d
007
cr nn 008maaau
008
200611s2019 si s 0 eng d
020
$a
9789811507588$q(electronic bk.)
020
$a
9789811507571$q(paper)
024
7
$a
10.1007/978-981-15-0758-8
$2
doi
035
$a
978-981-15-0758-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8855
$b
.I58 2019
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
025.042
$2
23
090
$a
TK5105.8855
$b
.I61 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Security and privacy in social networks and big data
$h
[electronic resource] :
$b
5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019 : revised selected papers /
$c
edited by Weizhi Meng, Steven Furnell.
246
3
$a
SocialSec 2019
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
xii, 276 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
1095
505
0
$a
Web Scanner Detection Based on Behavioral Differences -- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation -- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing -- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network -- Development of an Early Warning System for Network Intrusion Detection using Benford's Law Features -- An RTP Extension for Reliable User-data Transmission over VoIP Traffic -- A Hybrid Covert Channel with Feedback over Mobile Networks -- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things -- Integer Version of Ring-LWE and its Applications -- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart devices: A case study -- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu -- Online Event Detection in Social Media with Bursty Event Recognition -- Predicting Users' Emotional Intelligence with Social Networking Data -- Design and Implementation of Medical Dispute Governance Based on Blockchain -- Greedily Remove k links to hide important individuals in social network -- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System -- Blockchain-based Threshold Electronic Voting System -- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication -- Learning from Imbalanced Data: A Comparative Study.
520
$a
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
650
0
$a
Online social networks
$x
Security measures
$v
Congresses.
$3
853526
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Big data
$x
Security measures
$v
Congresses.
$3
833265
650
0
$a
Privacy, Right of|vCongresses.
$3
853527
650
1 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
700
1
$a
Meng, Weizhi.
$3
853478
700
1
$a
Furnell, Steven.
$3
260036
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
229.
$3
547963
856
4 0
$u
https://doi.org/10.1007/978-981-15-0758-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000176551
電子館藏
1圖書
電子書
EB TK5105.8855 .I61 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-15-0758-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入