Úplné zobrazení záznamu

Toto je statický export z katalogu ze dne 11.05.2024. Zobrazit aktuální podobu v katalogu.

Bibliografická citace

.
0 (hodnocen0 x )
EB
ONLINE
Singapore : Springer Singapore Pte. Limited, 2021
1 online resource (235 pages)
Externí odkaz    Plný text PDF 
   * Návod pro vzdálený přístup 


ISBN 9789813349223 (electronic bk.)
ISBN 9789813349216
Communications in Computer and Information Science Ser. ; v.1299
Print version: Lu, Wei Cyber Security Singapore : Springer Singapore Pte. Limited,c2021 ISBN 9789813349216
Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work.
2.1 Feature Augmentation.
2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.
4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.
Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology ---
2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.
3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation ---
4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.
A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.
001895363
express
(Au-PeEL)EBL6458353
(MiAaPQ)EBC6458353
(OCoLC)1232278670

Zvolte formát: Standardní formát Katalogizační záznam Zkrácený záznam S textovými návěštími S kódy polí MARC