|
|
|
|
LEADER |
10620nam a22005533i 4500 |
001 |
EBC6458353 |
003 |
MiAaPQ |
005 |
20231204023215.0 |
006 |
m o d | |
007 |
cr cnu|||||||| |
008 |
231204s2021 xx o ||||0 eng d |
020 |
|
|
|a 9789813349223
|q (electronic bk.)
|
020 |
|
|
|z 9789813349216
|
035 |
|
|
|a (MiAaPQ)EBC6458353
|
035 |
|
|
|a (Au-PeEL)EBL6458353
|
035 |
|
|
|a (OCoLC)1232278670
|
040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Lu, Wei.
|
245 |
1 |
0 |
|a Cyber Security :
|b 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
|
250 |
|
|
|a 1st ed.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore Pte. Limited,
|c 2021.
|
264 |
|
4 |
|c ©2020.
|
300 |
|
|
|a 1 online resource (235 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Communications in Computer and Information Science Series ;
|v v.1299
|
505 |
0 |
|
|a Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work.
|
505 |
8 |
|
|a 4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.
|
505 |
8 |
|
|a 3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation.
|
505 |
8 |
|
|a 2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.
|
505 |
8 |
|
|a A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.
|
588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a Wen, Qiaoyan.
|
700 |
1 |
|
|a Zhang, Yuqing.
|
700 |
1 |
|
|a Lang, Bo.
|
700 |
1 |
|
|a Wen, Weiping.
|
700 |
1 |
|
|a Yan, Hanbing.
|
700 |
1 |
|
|a Li, Chao.
|
700 |
1 |
|
|a Ding, Li.
|
700 |
1 |
|
|a Li, Ruiguang.
|
700 |
1 |
|
|a Zhou, Yu.
|
776 |
0 |
8 |
|i Print version:
|a Lu, Wei
|t Cyber Security
|d Singapore : Springer Singapore Pte. Limited,c2021
|z 9789813349216
|
797 |
2 |
|
|a ProQuest (Firm)
|
830 |
|
0 |
|a Communications in Computer and Information Science Series
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6458353
|z Click to View
|