ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982)

دانلود کتاب ایمنی و امنیت فضای سایبری: یازدهمین سمپوزیوم بین المللی، CSS 2019، گوانگژو، چین، 1 تا 3 دسامبر 2019، مجموعه مقالات، قسمت اول (یادداشت های سخنرانی در علوم کامپیوتر، 11982)

Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982)

مشخصات کتاب

Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982)

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 3030373363, 9783030373368 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 613 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 34 مگابایت 

قیمت کتاب (تومان) : 38,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 11


در صورت تبدیل فایل کتاب Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ایمنی و امنیت فضای سایبری: یازدهمین سمپوزیوم بین المللی، CSS 2019، گوانگژو، چین، 1 تا 3 دسامبر 2019، مجموعه مقالات، قسمت اول (یادداشت های سخنرانی در علوم کامپیوتر، 11982) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ایمنی و امنیت فضای سایبری: یازدهمین سمپوزیوم بین المللی، CSS 2019، گوانگژو، چین، 1 تا 3 دسامبر 2019، مجموعه مقالات، قسمت اول (یادداشت های سخنرانی در علوم کامپیوتر، 11982)

دو جلد LNCS 11982 و 11983 مجموعه مقالات یازدهمین سمپوزیوم بین المللی ایمنی و امنیت فضای مجازی، CSS 2019، در گوانگژو، چین، در دسامبر 2019 برگزار شد.
61 مقاله کامل و 40 مقاله کوتاه ارائه شده است. به دقت بررسی و از بین 235 مورد ارسالی انتخاب شد. این مقالات طیف وسیعی از موضوعات را در زمینه ایمنی و امنیت فضای سایبری، مانند احراز هویت، کنترل دسترسی، در دسترس بودن، یکپارچگی، حریم خصوصی، محرمانگی، قابلیت اطمینان و پایداری فضای سایبری پوشش می‌دهند. آنها در بخش های موضوعی زیر سازماندهی شده اند: امنیت شبکه. امنیت سیستم؛ امنیت اطلاعات؛ حفظ حریم خصوصی؛ یادگیری ماشین و امنیت؛ امنیت فضای مجازی؛ داده های بزرگ و امنیت؛ و ابر و امنیت؛


توضیحاتی درمورد کتاب به خارجی

The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.
The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions. The papers cover a broad range of topics in the field of cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. They are organized in the following topical sections: network security; system security; information security; privacy preservation; machine learning and security; cyberspace safety; big data and security; and cloud and security;



فهرست مطالب

Preface
Organization
Contents – Part I
Contents – Part II
Network Security
Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm
	Abstract
	1 Introduction
	2 The Analysis of Zoe Algorithm
	3 The Sequence Coverage Similarity Algorithm
	4 ICS Anomaly Detection Based on Improved Zoe Algorithm
	5 Analysis of Experimental Simulation Results
		5.1 Evaluation Criteria
		5.2 Datasets
		5.3 Experimental Results and Analysis
	6 Summary and Outlook
	Acknowledgements
	References
An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application
	Abstract
	1 Introduction
	2 Overview of CNN-Based Intrusion Detection Algorithms
	3 Intrusion Detection Method Based on Hierarchical Feature Learning
	4 Experimental Results and Performance Analysis
		4.1 Data Sets and Evaluation Indicators
		4.2 Experimental Results
	5 Conclusions and Future Work
	Acknowledgements
	References
Spoofing Attack Detection for Radar Network System State Estimation
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 Radar Measurement and State Estimation
		2.2 Spoofing Attacks
	3 Attack Detection Principles and Methods
	4 Data Fusion
	5 Simulation
	6 Conclusion
	References
Survey of Network Security Situational Awareness
	1 Introduction
	2 Overview of Network Security Situational Awareness
	3 Functions of Network Security Situational Awareness
		3.1 Extraction of Network Security Situation Elements
		3.2 Evaluation of Network Security Situation
		3.3 Prediction of Network Security Situation
	4 Development Trend of Network Security Situational Awareness
	5 Conclusion
	References
Encrypting VoLTE Communication via Baseband Firmware Extension
	Abstract
	1 Introduction
	2 Related Works
		2.1 HOOK
		2.2 VoLTE and RTP
	3 Encryption Design
		3.1 Key Agreement
		3.2 Encryption Algorithm
	4 Hooking and Patching Framework
	5 Implement
		5.1 Hook Packet Sending and Receiving Functions
		5.2 Encryption and Decryption
	6 Results and Analysis
		6.1 Agreement Key
		6.2 Data Encryption and Decryption
		6.3 Performance Evaluation
	7 Conclusions
	Acknowledgment
	References
Mitigating Link-Flooding Attack with Segment Rerouting in SDN
	1 Introduction
	2 Background and Related Work
		2.1 Link-Flooding Attack
		2.2 SDN and Segment Routing
		2.3 Previous Studies on LFA Defense
	3 System Model
	4 Segment Rerouting
	5 Performance Evaluation
	6 Conclusion
	References
System Security
BQSV: Protecting SDN Controller Cluster\'s Network Topology View Based on Byzantine Quorum System with Verification Function
	1 Introduction
	2 Preliminaries
		2.1 Background
		2.2 Threat Model
	3 Byzantine Quorum System with Verification Function
		3.1 Verification Function
		3.2 The Effectiveness of BQSV
		3.3 Detail Process Steps
	4 Implementation and Experiment
		4.1 Implementation
		4.2 Experiments
	5 Related Work
	6 Conclusion
	References
A Data Protection Scheme via Isolating Android Partitions
	Abstract
	1 Introduction
	2 Related Works
		2.1 Encryption Solution
		2.2 Security Domain Solution
	3 Design
		3.1 Summary
		3.2 Performance Overhead
		3.3 The Isolation Between Normal and Private Zone
		3.4 The Switch Between Normal and Private Zone
	4 Implementation
		4.1 Configuration of TF Card
		4.2 Switching the States
		4.3 Encryption of Private Zone
	5 Evaluation
		5.1 Test Results
		5.2 Performance Evaluation
		5.3 The Speed of Switching Evaluation
		5.4 Security Evaluation
		5.5 Performance Evaluation of Different TF Cards
	6 Limitation and Future Work
	7 Conclusions
	Acknowledgment
	References
A Code Protection Scheme via Inline Hooking for Android Applications
	Abstract
	1 Introduction
	2 Background
		2.1 Dex File Structure
		2.2 Android Hook Framework
	3 Scheme
		3.1 Instructions Extraction
		3.2 Instructions Storage
		3.3 Instructions Restoration
	4 Experiment
		4.1 Configure and Use Hooking Framework in the Project
		4.2 Process and Install APK
		4.3 Evaluation
	5 Conclusion
	Acknowledgment
	References
Log-Based Control Flow Attestation for Embedded Devices
	1 Introduction
	2 Background and Related Work
		2.1 Remote Attestation
		2.2 ARM Architecture
		2.3 TrustZone
		2.4 Physical Unclonable Functions
	3 Threat Model and Assumption
	4 Design
		4.1 Design Overview
		4.2 Design Details
	5 Implementation
		5.1 Architecture
		5.2 Instrumentation
		5.3 Optimization
		5.4 OP-TEE Integration
	6 Evaluation
		6.1 Experimental Setup
		6.2 Log Length
		6.3 Performance
	7 Security
		7.1 Code Injection Attack
		7.2 Code Reuse Attack
	8 Conclusion
	References
A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry Data
	Abstract
	1 Introduction
	2 Theory of Retrieving {\\varvec K}_{{\\varvec d}} from ALB Dataset
	3 Experiments
		3.1 Optech Aquarius System and Dataset
		3.2 Calculation
		3.3 Validation
	4 Conclusion
	Acknowledgments
	References
Shuffle Dense Networks for Biometric Authentication
	1 Introduction
	2 Related Work
		2.1 Dense Connections
		2.2 Residual Learning
		2.3 Grouped Convolutions
	3 Method
		3.1 Dense Connections with Residual Learning
		3.2 Shuffle Dense Connections
		3.3 Network Structure
	4 Experiments
		4.1 Datasets and Metrics
		4.2 Implementation Details
		4.3 Study of the Shuffle Operation
		4.4 Comparison with Other Methods
	5 Conclusion
	References
Information Security
An Efficient Attribute Based Encryption Scheme in Smart Grid
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 Bilinear Maps
		2.2 Complexity Assumptions
		2.3 Security Model
	3 Description of Our System
		3.1 System Model
		3.2 Basic Scheme
		3.3 Enhanced Scheme
	4 Security Analysis
	5 Performance Evaluation
	Acknowledgment
	References
Attribute-Based Signatures for Inner-Product Predicate from Lattices
	1 Introduction
	2 Preliminaries
		2.1 Attribute-Based Signatures for IP Predicate
		2.2 Background on Lattices
	3 The Underlying Interactive Protocol
		3.1 Some Sets and Matrices
		3.2 Some Techniques
		3.3 The Underlying Protocol
	4 The ABS-IP Scheme from Lattices
		4.1 Description of the Scheme
		4.2 Analysis of the Scheme
	References
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps
	1 Introduction
		1.1 Related Work
		1.2 Our Contributions
		1.3 Organization
	2 Preliminaries
		2.1 Notations
		2.2 Fuzzy Extractor
		2.3 Chebyshev Chaotic Map
		2.4 Network Model
		2.5 Requirements
	3 Review of Han et al.\'s Scheme
		3.1 Registration Phase
		3.2 Login and Authentication Phase
		3.3 Password and Biometric Change Phase
	4 Security Weaknesses of Han et al.\'s Scheme
		4.1 Lack of Protection of User Anonymity
		4.2 Flaws in the Validation of Timestamp
	5 Proposed Scheme
		5.1 Registration Phase
		5.2 Login and Authentication Phase
		5.3 Password and Biometric Change Phase
	6 Analysis
		6.1 Proof of Authentication and Key Agreement Using BAN Logic
		6.2 Security Analysis Against Various Attacks
	7 Comparison of Our Scheme with Related and Recently Proposed Schemes
	8 Conclusion
	References
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption
	1 Introduction
	2 Related Work
	3 System Model
		3.1 The Model of LC Accessing RC
		3.2 The Model of RC Accessing LC
	4 Construction of Our Proposed Scheme for Controllers in HSDN
		4.1 Algorithm Model of CP-ABE-IA
		4.2 Algorithm Model of KP-ABSC-MAS
	5 Conclusion
	References
ECC2: Error Correcting Code and Elliptic Curve Based Cryptosystem
	1 Introduction
	2 Preliminaries
		2.1 Linear Codes and Code-Based Cryptography
		2.2 Algebraic Geometry Codes and List Decoding Algorithms
		2.3 Hard Problems on Elliptic Codes
	3 McEliece Based Cryptosystem from Elliptic Codes
		3.1 Generate Elliptic Codes
		3.2 The Basic Scheme: ECC2
		3.3 Transform to Key Encapsulation Mechanism
	4 Security and Efficiency
		4.1 IND-CPA
		4.2 Known Attacks
		4.3 Proposition of Parameters
	5 Efficiency Analysis
	6 Conclusion
	References
A New Provably Secure Identity-Based Multi-proxy Signature Scheme
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 Bilinear Pairings
		2.2 Computational Assumption
	3 Definition and Security Model of Identity-Based Multi-proxy Signature
		3.1 Definition of Identity-Based Multi-proxy Signature
		3.2 Security Model of Identity-Based Multi-proxy Signature
	4 Identity-Based Multi-proxy Signature Scheme
	5 Analysis of Our Scheme
		5.1 Correctness
		5.2 Security Proof of Our Scheme
		5.3 Efficiency Comparison
	6 Conclusion
	Acknowledgements
	References
Privacy Preservation
A Differentially Private Trajectory Publishing Mechanism Based on Stay Points
	1 Introduction
	2 Preliminaries
		2.1 Trajectory and Stay Points
		2.2 Differential Privacy
		2.3 TF-IDF
		2.4 Data Availability
	3 Differentially Private Trajectory Publication Mechanism Based on Stay Points
		3.1 Differentially Private Stay Points Selection
		3.2 Two-Dimensional Laplacian-Based Trajectory Publication
		3.3 Algorithm Analysis
	4 Experiments
		4.1 Experiment Setup
		4.2 Availability Evaluation
	5 Conclusion
	References
Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity
	Abstract
	1 Introduction
		1.1 Risks of Medical Data Sharing and Data Privacy Protection Method of Medical Alliance Chain Based on K-Anonymity and QLDS
	2 Algorithm
		2.1 Symbolic Description
		2.2 Algorithm Description
	3 Experiment
		3.1 Experimental Results and Analysis
		3.2 Energy Consumption Analysis
	4 Conclusion
	Acknowledgements
	References
IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors
	1 Introduction
	2 Approach
		2.1 Scenarios
		2.2 Requirements
		2.3 Approach
		2.4 The Processing Steps of Data Encryption Algorithm
	3 System Design and Implementation
		3.1 Key Generation
		3.2 IoT Device Requests Invisible Membrane
		3.3 Cloud Generates Invisible Membrane
		3.4 Invisible Membrane Encryption
		3.5 Decrypt Image
	4 Performance Analyses
	5 Conclusion
	References
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain
	1 Introduction
	2 A New RSA Blind Signature Scheme
		2.1 RSA Blind Signature Scheme
	3 Fair Contract Signing Protocol
		3.1 Fair Contract Signing Protocol
		3.2 Performance Evaluation
	4 Conclusions
	References
Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks
	Abstract
	1 Introduction
	2 System Model
	3 Solution
		3.1 System Initialization
		3.2 Certificate Distribution for RSUs
		3.3 Certificate Distribution of Vehicles
		3.4 Secure Group Key Distribution and Batch Authentication
		3.5 Periodic Update of Group Key
	4 Cooperative Certification
	5 Safety Analysis
	6 Conclusion
	Acknowledgment
	References
Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing
	1 Introduction
	2 Related Works
	3 Virtual Vehicle Shadow Based Cooperative Privacy Preservation Scheme
		3.1 System Initialization
		3.2 Predictive Location Based Privacy Preservation for the Moving Vehicles
		3.3 Segmented Secret Based Privacy Preservation for the Parked Vehicles
	4 Security and Performance Analysis
		4.1 Security Analysis
		4.2 Performance Analysis
	5 Conclusions
	References
Machine Learning and Security
DeT: Defending Against Adversarial Examples via Decreasing Transferability
	1 Introduction
	2 Background
		2.1 Threat Model
		2.2 Deep Neural Networks
		2.3 Adversarial Examples
		2.4 Common Attacks
		2.5 Common Defenses
	3 Our Defense Method
		3.1 Preliminary Denoising
		3.2 Random Sampling
		3.3 Twice Denoising
		3.4 Prediction Voting
	4 Evaluation
		4.1 Setup
		4.2 Effectiveness of Cross Training
		4.3 Evaluation Against Black Box Attacks
		4.4 Evaluation Against the Gray Box Attack
		4.5 Comparison with the State-of-the-Art Defense
	5 Conclusion
	References
ADS-B Data Attack Detection Based on Generative Adversarial Networks
	1 Introduction
	2 Related Work
		2.1 ADS-B
		2.2 Novelty Detection with GAN
	3 Attack Detection Model
		3.1 ADS-B Data Model
		3.2 GAN Model
		3.3 Attack Behavior Analysis
	4 Experiment Analysis
	5 Discussion
	6 Conclusion
	References
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning
	Abstract
	1 Introduction
	2 State Estimation and LR Based FDI Attacks
		2.1 State Estimation
		2.2 LR Based FDI Attacks
	3 FDI Attacks Based on RLR
	4 Results and Discussion
		4.1 Test System
		4.2 Simulations Analysis
	5 Conclusion
	References
Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve
	1 Introduction
	2 Related Works and Background
		2.1 Related Works
		2.2 Background
	3 Proposed End-to-End System
		3.1 Attack Phase
		3.2 Detection Phase
	4 Implementation and Results
		4.1 Datasets
		4.2 Implementation
		4.3 Results
	5 Conclusion
	References
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant
	Abstract
	1 Introduction
	2 Database (PBSD) Construction
	3 Speaker Recognition Test
		3.1 Feature Extraction and Model Training
		3.2 Voice Aging
		3.3 Cold-Suffering Voice
	4 Model Updating Strategy
		4.1 Cold/Healthy Voices Discrimination
		4.2 Cold–Based Speaker Recognition Phrase
		4.3 Experimental Results
	5 Conclusion
	Acknowledgment
	References
Evading PDF Malware Classifiers with Generative Adversarial Network
	Abstract
	1 Introduction
	2 Background
		2.1 PDF Structure
		2.2 MalGAN
	3 Scheme
		3.1 Feature Extraction
		3.2 Training GANs for Generating Adversarial Vectors
		3.3 Crafting Adversarial PDF Malware Examples
	4 Experiment
		4.1 Datasets
		4.2 Classifiers
		4.3 GAN Models
		4.4 Results
	5 Related Works
	6 Conclusion
	Acknowledgment
	References
Cyberspace Safety
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning
	Abstract
	1 Introduction
	2 Related Work
	3 Multi-dimensional Feature Set for Cyberbullying Detection
		3.1 Feature Set Layer Structure
		3.2 Feature Set Dimension Structure
	4 Cyberbullying Detection Using the Proposed Multi-dimensional Feature Set
		4.1 Machine Learning Models for Cyberbullying Detection
		4.2 Dataset Collection
		4.3 Dataset Screening
		4.4 Dataset Preparation
		4.5 Classification
	5 Experimental Results
	6 Conclusions and Future Work
	References
Another Look at a Proposed Cubic Chaotic Mapping
	Abstract
	1 Introduction
	2 A Cubic Chaotic Mapping Revisited
	3 A Simple Pseudorandom Bit Generator
	4 Conclusion
	Acknowledgments
	References
Research on Drug Regulation Mode in the Age of the Internet of Things
	Abstract
	1 An Overview of the Internet of Things
		1.1 The Concept of the Internet of Things
		1.2 Features of the Internet of Things
		1.3 The Application of the Internet of Things in Domestic Related Fields
	2 A Summary of China’s Drug Regulatory Code
		2.1 The Definition of China’s Drug Regulatory Code Network
		2.2 The Basic Form of Drug Electronic Regulatory Code
		2.3 The Theory of the Internet of Drug Supervision and Code in China
	3 The Significance of the Internet of Things Technology in the Electronic Supervision of Drugs
		3.1 Realize Real-Time Monitoring and Guarantee the Quality and Safety of Drug Circulation
		3.2 Realizing the Effective Tracking of the Whole Process of Drug Circulation
		3.3 Enriching the Content of Drug Supervision and Improving the Ability of Drug Regulation
		3.4 Greatly Simplifying the Work of Pharmaceutical Enterprises and Improving the Efficiency of Drug Electronic Supervision
	4 New Model of Drug Regulation in the Era of Internet of Things
		4.1 Electronic Supervision in the Field of Drug Circulation
		4.2 Drug Electronic Supervision Under the Technology of Internet of Things
	5 Construction of China’s Drug Safety Supply Chain Supervision Model
		5.1 Non Supply Chain Drug Safety Supervision Model and Existing Problems
		5.2 Construction of Regulatory Model of Drug Safety Supply Chain in China
		5.3 Characteristics of the Mode of Drug Safety Supply Chain Supervision
	6 Discussion of Potential Problems
		6.1 Stability of Work Platform
		6.2 Data Security Problem
	7 Conclusion
	Acknowledgement
	References
Privacy-Aware Service Migration for Edge Computing in Urban Cities
	1 Introduction
	2 Related Work
	3 System Model and Problem Formulation
		3.1 Resource Model
		3.2 Load Balance Analysis of ENs
		3.3 Transmission Time Analysis
		3.4 Privacy Entropy Analysis
		3.5 Problem Definition
	4 A Privacy-Aware Service Migration Method for Edge Computing in Urban Cities
		4.1 Encoding
		4.2 Fitness Functions and Constraints
		4.3 Initialization
		4.4 Selection
		4.5 Crossover and Mutation
		4.6 Schedule Selection Using SAW and MCDM
		4.7 Method Review
	5 Experiment Evaluation
		5.1 Experimental Context
		5.2 Performance Evaluation
	6 Conclusion and Future Work
	References
A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 Trapdoor Hash Function
		2.2 System Model
	3 Certificateless Aggregate Signature Scheme Based on Multi-trapdoor Hash Function
	4 Efficiency Analysis
	5 Conclusion
	Acknowledgments
	References
The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social Development
	Abstract
	1 Introduction
	2 Fuzzy Integral
		2.1 Fuzzy Measure
		2.2 Fuzzy Integral of Fuzzy Measure
		2.3 Fuzzy Distribution Function
		2.4 Constructing the Value of gλ
		2.5 Algorithm Process
	3 Fuzzy Integral Evaluation Method
		3.1 Determine the Evaluation Index
		3.2 Determine the Satisfaction of Each Factor and the Weight Distribution of Each Factor Among the Evaluated Objects
		3.3 Ascertain the Evaluation Value of the Complex Development Level of the Society
		3.4 The Experiment
	4 Conclusions
	Acknowledgement
	References
Big Data and Security
Big Data Based E-commerce Search Advertising Recommendation
	1 Introduction
	2 Architecture of Search Advertising System
	3 Data Preparation
	4 Basic Process of Search Advertising Recommendation
	5 Experiments and Analysis
	6 Conclusion
	References
File Recovery of High-Order Clearing First Cluster Based on FAT32
	Abstract
	1 Introduction
	2 Related Work
	3 Theory of File Deletion and Recovery of FAT32
		3.1 FAT32 File System
		3.2 Fragmentation
		3.3 File Identification
		3.4 Analysis of File Deletion Operations
	4 The Proposed Algorithm of High-Order Clearing First Cluster Based on FAT32
		4.1 Recover Methods of High Level Clearing
		4.2 The Proposed Algorithm
	5 Experimental Results and Analysis
	6 Conclusion
	Acknowledgements
	References
Mobile Recommendation Method for Fusing Item Features and User Trust Relationship
	Abstract
	1 Introduction
	2 Related Research Work
	3 Mobile Recommendation Algorithm Based on EMD
		3.1 Similarity Calculation of Mobile Users Based on EMD
		3.2 The Trust Relation of Mobile Users
		3.3 Score Prediction
		3.4 Recommended Process Description
	4 Experiment and Analysis
		4.1 Experimental Data Set
		4.2 Evaluation
		4.3 Experimental Results and Analysis
	5 Conclusion
	Acknowledgment
	References
Research on Collaborative Filtering Recommendation Method Based on Context and User Credibility
	Abstract
	1 Introduction
	2 Analysis of the Traditional Collaborative Filtering
		2.1 The Description of Traditional Collaborative Filtering
		2.2 Traditional Collaborative Filtering Problem Analysis
	3 Collaborative Filtering Recommendation Model Based on Context and User Credibility
		3.1 User Context Description
		3.2 User Credibility
		3.3 Recommendation Algorithm
	4 Collaborative Filtering Recommendation Method Based on MapReduce
	5 Experiment and Analysis
	6 Conclusion
	Acknowledgment
	References
Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCT
	Abstract
	1 Introduction
	2 Theoretical Background
		2.1 Non-Subsampled Contourlet Transform (NSCT)
		2.2 Redundant Discrete Wavelet Transform (RDWT)
	3 The Proposed Algorithm
		3.1 Feature Extraction
	4 Experimental Result and Analysis
		4.1 Attacks
		4.2 Algorithms Comparison
	5 Conclusions
	References
An Improved Container Scheduling Algorithm Based on PSO for Big Data Applications
	1 Introduction
	2 Related Work
	3 Improved Container Scheduling Algorithm Based on PSO Algorithm
		3.1 Basic Definition
		3.2 Improvement of Kube-Scheduler Optimization Process
		3.3 Improvement Based on Particle Swarm Optimization
	4 Experimental Environment and Results Analysis
		4.1 Experimental Environment
		4.2 K-PSO and Basic PSO Algorithm Comparison Experiment
		4.3 K-PSO Scheduling and Comparison of Existing Scheduling Strategies
		4.4 Analysis of Experimental Results
	5 Conclusion
	References
Cloud and Security
A Secure Density Peaks Clustering Algorithm on Cloud Computing
	Abstract
	1 Introduction
	2 Preliminaries
	3 Basic Security Primitives
		3.1 Existing Security Protocol
		3.2 The Proposed Protocol
	4 Algorithm Description
		4.1 Security Density Peak Clustering Algorithm Based on Grid
		4.2 Security Analysis
		4.3 Complexity Analysis
	5 Performance Evaluation
	6 Conclusion
	Acknowledgment
	References
Research on Cloud Computing Security Problems and Protection Countermeasures
	1 Introduction
	2 Overview of Cloud Computing
		2.1 The Concept of Cloud Computing
		2.2 Cloud Computing Model
		2.3 Six Characteristics of Cloud Computing
	3 Cloud Computing Security Analysis
		3.1 Data Security
		3.2 Technology Security
		3.3 Application Security
		3.4 Other Safety Issues
	4 Research on Cloud Computing Security System and Protection Countermeasures
		4.1 Establish Elastic Cloud Security System
		4.2 Security Countermeasures for Cloud Computing
	5 Conclusion
	References
Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing
	Abstract
	1 Introduction
	2 Literature Review
	3 The Model and Its Analysis
		3.1 Logistics Resources Scheduling Problem
		3.2 Distribution Vehicle Scheduling Under Improved Genetic Algorithm
		3.3 Algorithm Analysis of the Model
		3.4 Algorithm Flow Under Cloud Computing
	4 Conclusions
	Acknowledgement
	References
Cloud Security Solution Based on Software Defined Network
	1 Introduction
	2 Software-Defined Networks and Related Technologies
		2.1 Software-Defined Network
		2.2 Open Flow Protocol
		2.3 Software Defined Security Services
	3 Cloud Security Solution Model Based on Software-Defined Network
		3.1 The Three Dimensions of the Model
		3.2 Security Service Framework
		3.3 The Advantages of a Cloud Security Model Based on Software Definitions
	4 Summary
	References
An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage Applications
	Abstract
	1 Introduction
	2 Related Work
	3 Preliminary Knowledge
		3.1 How Multi-Paxos Protocol Works
		3.2 Problem Statement
	4 Our Solution: An Optimized Multi-paxos Protocol
	5 Evaluation
	6 Conclusion
	Acknowledgments
	References
A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage
	1 Introduction
	2 Preliminaries
		2.1 Blockchain and Smart Contract
		2.2 InterPlanetary File System
		2.3 Notations
		2.4 System Model and Threat Model
	3 The Proposed Scheme
		3.1 Detailed Design of Ciphertext Retrieval System Based on Blockchain
	4 Security and Performance Analysis
		4.1 Security Analysis
		4.2 Storage Performance Analysis
	5 Conclusion
	References
Correction to: Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps
	Correction to: Chapter “Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps” in: J. Vaidya et al. (Eds.): Cyberspace Safety and Security, LNCS 11982, https://doi.org/10.1007/978-3-030-37337-5_15
Author Index




نظرات کاربران