With the growing trend of cloud computing, the necessity for secure data storage arises as traditional security measures fail with different types of new emerging cyber threats. The paper introduces a file storage sys...
详细信息
The proceedings contain 28 papers. The topics discussed include: performance and usability implications of multiplatform and WebAssembly containers;operations patterns for hybrid quantum applications;optimization of c...
ISBN:
(纸本)9789897587474
The proceedings contain 28 papers. The topics discussed include: performance and usability implications of multiplatform and WebAssembly containers;operations patterns for hybrid quantum applications;optimization of cloud-native application execution over the edge cloud continuum enabled by DVFS;energy-aware node selection for cloud-based parallel workloads with machine learning and infrastructure as code;security-aware allocation of replicated data in distributed storage systems;performance analysis of mdx ii: a next-generation cloud platform for cross-disciplinary data science research;data orchestration platform for AI workflows execution across computing continuum;framework for decentralized data strategies in virtual banking: navigating scalability, innovation, and regulatory challenges in Thailand;and anomaly detection for partially observable container systems based on architecture profiling.
The proceedings contain 63 papers. The special focus in this conference is on security, Privacy, and Anonymity in Computation, communication, and Storage. The topics include: Optimization of Optical Imaging MIMO-OFDM ...
ISBN:
(纸本)9783030248994
The proceedings contain 63 papers. The special focus in this conference is on security, Privacy, and Anonymity in Computation, communication, and Storage. The topics include: Optimization of Optical Imaging MIMO-OFDM Precoding Matrix for Underwater VLC;data Collection Scheme for Underwater Sensor Cloud System Based on Fog computing;a Survey on Fog computing;an Approximate Data Collection Algorithm in Space-Based Internet of Things;outlier Detection of Internet of Vehicles;review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges;CP-MCNN: Multi-label Chest X-ray Diagnostic Based on Confidence Predictor and CNN;naïve Approach for Bounding Box Annotation and Object Detection Towards Smart Retail Systems;evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine;a Weighted Risk Score Model for IoT Devices;An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation;lightweight Distributed Attribute Based Keyword Search System for Internet of Things;continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks;software Quality Assurance: Tools and Techniques;A Campus Carpooling System Based on GPS Trajectories;Web-Based Intelligence for IDS;predictably Deterrable? The Case of System Trespassers;connected Vehicles: A Privacy Analysis;privacy-Preserving Big Data Analytics: From Theory to Practice;a Framework to Identify People in Unstructured Environments Incorporating Biometrics;continuous Authentication Using Mouse Clickstream Data Analysis;presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net;cost-Efficient Task Scheduling for Geo-distributed Data Analytics;task Scheduling for Streaming Applications in a Cloud-Edge System.
The proceedings contain 26 papers. The special focus in this conference is on security and Privacy in communication Networks. The topics include: Secure and verifiable top-k query in two-tiered sensor networks;a bidir...
ISBN:
(纸本)9783540354673
The proceedings contain 26 papers. The special focus in this conference is on security and Privacy in communication Networks. The topics include: Secure and verifiable top-k query in two-tiered sensor networks;a bidirectional light communications framework for secure communications on smartphones;towards resilient and efficient bidirectional communication botnets;contrasting permission patterns between clean an malicious android applications;mining api-level features for robust malware detection in android;disabling a computer by exploiting softphone vulnerabilities;practical confinement of untrusted software in virtual cloud computing;integrated security architecture for virtual machines;generic mediated encryption;public-key encryption resilient to linear related-key attacks;detecting package-level clones using machine learning;automatic polymorphic exploit generation for software vulnerabilities;a novel web tunnel detection method based on protocol behaviors;non-hierarchical memory access rights to enforce the principle of least privilege;scalable security model generation and analysis using k-importance measures;control flow security in embedded systems;an e-payment architecture ensuring a high level of privacy protection;unveiling privacy setting breaches in online social networks;security concerns and remedy in a cloud based e learning system;ensuring data integrity by anomaly node detection during data gathering in WSNS;reversible data hiding scheme based on 3-least significant bits and mix column transform.
The proceedings contain 75 papers. The special focus in this conference is on security with Intelligent computing and Big-data Services. The topics include: A Lossless Polynomial-Based Secret Image Sharing Scheme Util...
ISBN:
(纸本)9783030169459
The proceedings contain 75 papers. The special focus in this conference is on security with Intelligent computing and Big-data Services. The topics include: A Lossless Polynomial-Based Secret Image Sharing Scheme Utilizing the Filtering Operation;CT Image Secret Sharing Based on Chaotic Map and Singular Value Decomposition;Robust Speaker Recognition Using Improved GFCC and Adaptive Feature Selection;outlier Detection Based on Local Density of Vector Dot Product in Data Stream;multi-level Competitive Swarm Optimizer for Large Scale Optimization;Experimental Comparison of Free IP Geolocation Services;integrating Multiple Feature Descriptors for Computed Tomography Image Retrieval;Automatic Forgery Localization via Artifacts Analysis of JPEG and Resampling;Arbitrary Style Transfer of Facial Image Based on Feed-Forward Network and Its Application in Aesthetic QR Code;toward a Blockchain Based Image Network Copyright Transaction Protection Approach;Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern;A Heterogeneous Multiprocessor Independent Task Scheduling Algorithm Based on Improved PSO;cross-Domain Text Sentiment Classification Based on Wasserstein Distance;WebRTC-Based On-Site Operation and Maintenance Adaptive Video Streaming Rate Control Strategy;evaluation of Enzymatic Extract with Lipase Activity of Yarrowia Lipolytica. An Application of Data Mining for the Food Industry Wastewater Treatment;load-Balancing-Based Reliable Mapping Algorithm for Virtual Resources in Power communication Network;Enhancing Network Intrusion Detection System Method (NIDS) Using Mutual Information (RF-CIFE);you Are What You Search: Attribute Inference Attacks Through Web Search Queries;new Publicly Verifiable Cloud Data Deletion Scheme with Efficient Tracking;A Transient Grid security Control Algorithm Based on EMS System;a Fog-Based Collusion Detection System.
Distributed systems, which have become an integral and inseparable component of the modern technology infrastructure, hold data protection in the highest regard. It is of utmost importance to safeguard the constantly ...
详细信息
ISBN:
(纸本)9783031751691;9783031751707
Distributed systems, which have become an integral and inseparable component of the modern technology infrastructure, hold data protection in the highest regard. It is of utmost importance to safeguard the constantly expanding and growing amount of data that is present within these distributed systems, as the methods employed by malicious attackers are continuously evolving. This evolution necessitates a forward-thinking and proactive approach to the detection and containment of these attacks. In line with this, this scholarly article introduces a highly robust containment system that has been specifically designed to minimize the time required for recovery and to mitigate the impact of cyberattacks on distributed systems. The proposed system makes use of a comprehensive and all-encompassing set of techniques in order to accurately identify and effectively isolate compromised nodes within the distributed environment that has been targeted by an attack. By implementing this isolation process, the containment system successfully prevents any further damage from occurring and effectively halts any potential data breaches, all while ensuring the preservation and integrity of the existing files that reside within the compromised node. Ultimately, the true effectiveness and power of this system lies within its unique ability to automate the containment process, thereby enabling a rapid and efficient response to any cyberattack that may occur, resulting in minimal downtime and disruption.
The proceedings contain 21 papers. The special focus in this conference is on Advances in security of Information and communication Networks. The topics include: Clustering based group key management for MANET;chord-e...
ISBN:
(纸本)9783642405969
The proceedings contain 21 papers. The special focus in this conference is on Advances in security of Information and communication Networks. The topics include: Clustering based group key management for MANET;chord-enabled key storage and lookup scheme for mobile agent-based hierarchical WSN;hardware advancements effects on MANET development, application and research;a virtualized network testbed for zero-day worm analysis and countermeasure testing;a categorized trust-based message reporting scheme for VANETs;blind watermark approach for map authentication using support vector machine;high payload audio watermarking using sparse coding with robustness to MP3 compression;an HMM-based reputation model;towards IT-legal framework for cloud computing;a blind robust 3D-watermarking scheme based on progressive mesh and self organization maps;a cattle identification approach using live captured muzzle print images;algebraic replay attacks on authentication in RFID protocols;a privacy preserving approach to smart metering;vulnerability scanners capabilities for detecting windows missed patches;elderly healthcare data protection application for ambient assisted living;a secure framework for OTA smart device ecosystems using ECC encryption and biometrics;machine learning techniques for anomalies detection and classification;detecting vulnerabilities in web applications using automated black box and manual penetration testing and linear correlation-based feature selection for network intrusion detection model.
In today’s digital landscape, securing sensitive information has become an essential priority in the modern digital era for both individuals and organizations. This project introduces a comprehensive web application ...
详细信息
5G networks have many attractive features which can improve capacity and speed to provide reliable and speedy connectivity to thousands of devices of Internet of Things. Telemedicine relies on mobile healthcare system...
详细信息
The proceedings contain 55 papers. The special focus in this conference is on IOT Applications, Multimedia Applications, Multimedia security and Forensics. The topics include: A lifetime-aware network maintenance meth...
ISBN:
(纸本)9783319486734
The proceedings contain 55 papers. The special focus in this conference is on IOT Applications, Multimedia Applications, Multimedia security and Forensics. The topics include: A lifetime-aware network maintenance method for wireless sensor networks;an efficient task assignment mechanism for crowdsensing systems;fast pre-distribution authentication protocol for V2I;a context-aware communication approach based on the underwater acoustic sensor network;non-technical loss fraud targeting time-based pricing in smart grid;social influence analysis based on modeling interactions in dynamic social networks;automated vulnerability modeling and verification for penetration testing using Petri nets;integrating visible light with radio frequency communications for safety applications;temperature error correction based on BP Neural network in meteorological wireless sensor network;an energy-efficient data gathering based on compressive sensing;profit concerning and truthful online spectrum double auction mechanism;non-technical loss fraud in advanced metering infrastructure in smart grid;compressive sensing based on energy-efficient communication;the optimal trajectory planning for UAV in UAV-aided networks;an energy-efficient routing protocol for WSNs with single mobile sink;a method for electric load data verification and repair in home environment;a survey on the research of indoor RFID positioning system;color image quality assessment with quaternion moments;original image tracing with image relational graph for near-duplicate image elimination;palmprint matching by minutiae and ridge distance;anomaly detection algorithm for helicopter rotor based on STFT and SVDD and an efficient passive authentication scheme for copy-move forgery based on dct.
暂无评论