000 04931nam a22006855i 4500
001 978-981-16-0422-5
003 DE-He213
005 20240423125403.0
007 cr nn 008mamaa
008 210209s2021 si | s |||| 0|eng d
020 _a9789811604225
_9978-981-16-0422-5
024 7 _a10.1007/978-981-16-0422-5
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aSecurity in Computing and Communications
_h[electronic resource] :
_b8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers /
_cedited by Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aX, 305 p. 33 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1364
505 0 _aPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS - Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.
520 _aThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aApplication software.
650 0 _aData protection.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer systems.
650 1 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aData and Information Security.
650 2 4 _aMobile and Network Security.
650 2 4 _aComputer System Implementation.
700 1 _aThampi, Sabu M.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Guojun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRawat, Danda B.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKo, Ryan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aFan, Chun-I.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811604218
776 0 8 _iPrinted edition:
_z9789811604232
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1364
856 4 0 _uhttps://doi.org/10.1007/978-981-16-0422-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177374
_d177374