Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Security and Privacy in Social Networks and Big Data -

Security and Privacy in Social Networks and Big Data

5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers

Weizhi Meng, Steven Furnell (Herausgeber)

Buch | Softcover
276 Seiten
2019 | 1st ed. 2019
Springer Verlag, Singapore
978-981-15-0757-1 (ISBN)
CHF 74,85 inkl. MwSt
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019.
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. 
The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.

Web Scanner Detection Based on Behavioral Differences.- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation.- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing.- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network.- Development of an Early Warning System for Network Intrusion Detection using Benford’s Law Features.- An RTP Extension for Reliable User-data Transmission over VoIP Traffic.- A Hybrid Covert Channel with Feedback over Mobile Networks.- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.- Integer Version of Ring-LWE and its Applications.- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension.- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.- Exploit in smart devices: A case study.- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu.- Online Event Detection in Social Media with Bursty Event Recognition.- Predicting Users' Emotional Intelligence with Social Networking Data.- Design and Implementation of Medical Dispute Governance Based on Blockchain.- Greedily Remove k links to hide important individuals in social network.- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System.- Blockchain-based Threshold Electronic Voting System.- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication.- Learning from Imbalanced Data: A Comparative Study. 

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science ; 1095
Zusatzinfo 59 Illustrations, color; 138 Illustrations, black and white; XII, 276 p. 197 illus., 59 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 981-15-0757-0 / 9811507570
ISBN-13 978-981-15-0757-1 / 9789811507571
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20