Frontiers in Cyber Security
5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings
(Sprache: Englisch)
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022.
The 26 full papers were included in this book were carefully reviewed and...
The 26 full papers were included in this book were carefully reviewed and...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
Fr. 106.50
inkl. MwSt.
- Kreditkarte, Paypal, Rechnungskauf
- 30 Tage Widerrufsrecht
Produktdetails
Produktinformationen zu „Frontiers in Cyber Security “
Klappentext zu „Frontiers in Cyber Security “
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
Inhaltsverzeichnis zu „Frontiers in Cyber Security “
IoT Security.- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT.- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles.- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building.- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things.- Artificial Intelligence and Cyber Security.- Cross-site Scripting Threat Intelligence Detection based on Deep Learning.- Power Analysis Attack Based on Lightweight Convolutional Neural Network.- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms.- SVFLS: A Secure and Verifiable Federated Learning Training Scheme.- A Pragmatic Label-Specific Backdoor Attack.- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source.- Blockchain Technology and Application.- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment.- Blockchain-based Patient-to-Patient Health Data Sharing.- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain.- Ethereum Contract Honeypot Risk Analysis.- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains.- Cryptography.- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme.- New Trapdoor and Preimage Sampling on NTRU Lattice.- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature.- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares.- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.- Database Security.- A Comparative Analysis of Security Features and Concerns in
... mehr
NoSQL Databases Scheme.- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern.- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing.- Quantum Cryptography.- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate.- Network Security.- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
... weniger
Bibliographische Angaben
- 2022, 1st ed. 2022, XIII, 430 Seiten, 106 farbige Abbildungen, Masse: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben: Emmanuel Ahene, Fagen Li
- Verlag: Springer, Berlin
- ISBN-10: 9811984441
- ISBN-13: 9789811984440
Sprache:
Englisch
Kommentar zu "Frontiers in Cyber Security"
0 Gebrauchte Artikel zu „Frontiers in Cyber Security“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Frontiers in Cyber Security".
Kommentar verfassen