Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "security"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/1383173567 |
| Titel | Security and Privacy in Communication Networks : 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part I / edited by Saed Alrabaee, Kim-Kwang Raymond Choo, Ernesto Damiani, Robert H. Deng |
| Person(en) |
Alrabaee, Saed (Herausgeber) Choo, Kim-Kwang Raymond (Herausgeber) Damiani, Ernesto (Herausgeber) Deng, Robert H. (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XV, 416 p. 142 illus., 117 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-031-94444-4 Printed edition:: ISBN: 978-3-031-94446-8 |
| Inhalt | Privacy and Cryptography -- Byzantine Robust Federated Learning for Unreliable Environments by Random-Matching Verification and Credibility Table -- PPSA: Polynomial Private Stream Aggregation for Time Series Data Analysis -- SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption -- Stuck in the SAND: When Your Neighbor Becomes Your Enemy -- Optimized Privacy Preserving Clustering with Fully Homomorphic Encryption -- Noya: An Efficient, Flexible and Secure CNN Inference Model based on Homomorphic Encryption -- OCE PTree: An Online Communication Efficient Privacy preserving Decision Tree Evaluation -- An Effective Multiple Private Set Intersection -- BCPIR: More Efficient Keyword PIR via Block Building Codewords -- Embedding optimized Steganography Based on Post-quantum Encryption and BPNN -- AI for cybersecurity and Adversial models -- Enhancing Runtime Application Self Protection with Unsupervised Deep Learning -- Optical Lens Attack on Deep Learning Based Monocular Depth Estimation -- RootES: A Method for Generating Text Adversarial Examples Using Root Embedding Space -- Boosting GAN Performance: Feature Transformation for Heavy Tailed Malware Data Generation -- SPC-GAN-Attack: Attacking Slide Puzzle CAPTCHAs by Human Like Sliding Trajectories Based on Generative Adversarial Network -- Improving Interpretability: Visual Analysis of Deep Learning Based Multi Channel Attacks -- Deep Reinforcement Learning from Drifting Network Environments in Anomaly Detection -- A Comparative Study on Source Code Attribution Using AI: Datasets, Features, and Techniques -- Quantum Computing in Cybersecurity -- Harnessing the Power of Quantum Computing for URL Classification: A Comprehensive Study -- Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks -- A Secure Blockchain Network with Quantum Key Encryption and Authentication |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2512020306547.241262687904 DOI: 10.1007/978-3-031-94445-1 |
| URL | https://doi.org/10.1007/978-3-031-94445-1 |
| ISBN/Einband/Preis | 978-3-031-94445-1 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 627 |
| DDC-Notation | 658.5 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 650 Management |
| Online-Zugriff | Archivobjekt öffnen |

