Amazon cover image
Image from Amazon.com

Frontiers in Cyber Security [electronic resource] : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1726Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2022Edition: 1st ed. 2022Description: XIII, 430 p. 131 illus., 106 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789811984457
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.

This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in