소장자료

>>
소장자료
>
000 nam5i
001 2210080933583
003 DE-He213
005 20250321102103
007 cr nn 008mamaa
008 240103s2024 si | s |||| 0|eng d
020 a97898199961489978-981-99-9614-8
024 a10.1007/978-981-99-9614-82doi
040 a221008
050 aTK7885-7895
050 aTK5105.5-5105.9
072 aUK2bicssc
072 aCOM0670002bisacsh
072 aUK2thema
082 a621.39223
082 a004.6223
245 00 aEmerging Information Security and Applicationsh[electronic resource] :b4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings /cedited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng.
250 a1st ed. 2024.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2024.
300 aXII, 185 p. 48 illus., 35 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aCommunications in Computer and Information Science,x1865-0937 ;v2004
505 aPtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples -- Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-step Method -- Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System -- A Systematic Method for Constructing ICT Supply Chain Security Requirements -- Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and its Applications to Pairing-based Cryptography -- Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge -- Deep Neural Network Model over Encrypted Data -- Privacy Protection Mechanism for Fair Federated Learning -- Chinese Named Entity Recognition within the Electric Power Domain -- Adversarial Sampling Attacks and Defense in DNS Data Exfiltration -- CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN.
520 aThis volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023. The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.
650 aComputer engineering.
650 aComputer networks .
650 aCryptography.
650 aData encryption (Computer science).
650 aArtificial intelligence.
650 aData protection.
650 aComputer networksxSecurity measures.
650 aComputer Engineering and Networks.
650 aCryptology.
650 aArtificial Intelligence.
650 aData and Information Security.
650 aMobile and Network Security.
700 aShao, Jun.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aKatsikas, Sokratis K.eeditor.0(orcid)0000-0003-2966-96831https://orcid.org/0000-0003-2966-96834edt4http://id.loc.gov/vocabulary/relators/edt
700 aMeng, Weizhi.eeditor.0(orcid)0000-0003-4384-57861https://orcid.org/0000-0003-4384-57864edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819996131
776 iPrinted edition:z9789819996155
830 aCommunications in Computer and Information Science,x1865-0937 ;v2004
856 uhttps://doi.org/10.1007/978-981-99-9614-8
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Emerging Information Security and Applications[electronic resource] :4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings /edited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng
종류
전자책
서명
Emerging Information Security and Applications[electronic resource] :4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings /edited by Jun Shao, Sokratis K. Katsikas, Weizhi Meng
저자명
판 사항
1st ed. 2024.
형태사항
XII, 185 p 48 illus, 35 illus in color online resource.
주기사항
This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023. The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기