000 05311nam a22006495i 4500
001 978-981-19-8445-7
003 DE-He213
005 20240423125138.0
007 cr nn 008mamaa
008 221202s2022 si | s |||| 0|eng d
020 _a9789811984457
_9978-981-19-8445-7
024 7 _a10.1007/978-981-19-8445-7
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aFrontiers in Cyber Security
_h[electronic resource] :
_b5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings /
_cedited by Emmanuel Ahene, Fagen Li.
250 _a1st ed. 2022.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2022.
300 _aXIII, 430 p. 131 illus., 106 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1726
505 0 _aIoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13–15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer engineering.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aArtificial intelligence.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCryptology.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aMobile and Network Security.
650 2 4 _aArtificial Intelligence.
700 1 _aAhene, Emmanuel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLi, Fagen.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811984440
776 0 8 _iPrinted edition:
_z9789811984464
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1726
856 4 0 _uhttps://doi.org/10.1007/978-981-19-8445-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c174739
_d174739