Browse Subject Headings
Security and Privacy in Communication Networks : 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II
Security and Privacy in Communication Networks : 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II
Click to enlarge
ISBN No.: 9783031649530
Pages: xvii, 517
Year: 202410
Format: Trade Paper
Price: $ 137.99
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Intrusion and Anomaly Detection.- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification.- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security.- Enhancing Cross Device Security with Fine Grained Permission Control.


- The Security Analysis of ROS2 Communication.- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security.- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.- Visibility of Scan Traffic Trends in Sparsely Populated Darknets.- Privacy.


- Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks.- Split Without a Leak Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving Reputation Aggregation System.- Program Analysis.


- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android Ransomware Generators.- Software Security.- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style for software plagiarism detection.- Understanding and Measuring Inter Process Code Injection in Windows Malware.



To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings