Library Catalog

>>
Library Catalog
>
000 nam5i
001 2210080933583
003 DE-He213
005 20250321102103
007 cr nn 008mamaa
008 240103s2024 si | s |||| 0|eng d
020 a97898199961489978-981-99-9614-8
024 a10.1007/978-981-99-9614-82doi
040 a221008
050 aTK7885-7895
050 aTK5105.5-5105.9
072 aUK2bicssc
072 aCOM0670002bisacsh
072 aUK2thema
082 a621.39223
082 a004.6223
245 00 aEmerging Information Security and Applicationsh[electronic resource] :b4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings /cedited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng.
250 a1st ed. 2024.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2024.
300 aXII, 185 p. 48 illus., 35 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aCommunications in Computer and Information Science,x1865-0937 ;v2004
505 aPtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples -- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-step Method -- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge -- Deep Neural Network Model over Encrypted Data -- Privacy Protection Mechanism for Fair Federated Learning -- Chinese Named Entity Recognition within the Electric Power Domain -- Adversarial Sampling Attacks and Defense in DNS Data Exfiltration -- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN.
520 aThis volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023. The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.
650 aComputer engineering.
650 aComputer networks .
650 aCryptography.
650 aData encryption (Computer science).
650 aArtificial intelligence.
650 aData protection.
650 aComputer networksxSecurity measures.
650 aComputer Engineering and Networks.
650 aCryptology.
650 aArtificial Intelligence.
650 aData and Information Security.
650 aMobile and Network Security.
700 aShao, Jun.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aKatsikas, Sokratis K.eeditor.0(orcid)0000-0003-2966-96831https://orcid.org/0000-0003-2966-96834edt4http://id.loc.gov/vocabulary/relators/edt
700 aMeng, Weizhi.eeditor.0(orcid)0000-0003-4384-57861https://orcid.org/0000-0003-4384-57864edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819996131
776 iPrinted edition:z9789819996155
830 aCommunications in Computer and Information Science,x1865-0937 ;v2004
856 uhttps://doi.org/10.1007/978-981-99-9614-8
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Emerging Information Security and Applications[electronic resource] :4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings /edited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng
Material type
전자책
Title
Emerging Information Security and Applications[electronic resource] :4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings /edited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng
Author's Name
판 사항
1st ed. 2024.
Physical Description
XII, 185 p 48 illus, 35 illus in color online resource.
Keyword
This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023. The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.
관련 URL

Holdings Information

RReservation
MMissing Book Request
CClosed Stack Request
IInter-Campus Loan
CPriority Cataloging
PPrint
Registration no. Call no. Location Mark Location Status Due for return Service
전자자료는 소장사항이 존재하지 않습니다

Book Overview

Full menu