دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Shui Yu, Peter Mueller, Jiangbo Qian سری: Communications in Computer and Information Science ISBN (شابک) : 9789811591280 ناشر: Springer سال نشر: 2020 تعداد صفحات: 756 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 18 مگابایت
در صورت تبدیل فایل کتاب Security and Privacy in Digital Economy به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت و حریم خصوصی در اقتصاد دیجیتال نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
https://www.springer.com/gp/book/9789811591280
امنیت و حریم خصوصی در اقتصاد دیجیتال: اولین کنفرانس بین المللی، SPDE 2020، کوژو، چین، 30 اکتبر - 1 نوامبر 2020
این کتاب مجموعه مقالات داوری اولین کنفرانس بینالمللی امنیت و حریم خصوصی در اقتصاد دیجیتال، SPDE 2020 است که در کوژو، چین، در اکتبر 2020 برگزار شد*.
49 مورد تجدیدنظر شده مقالات کامل و 2 مقاله کوتاه به دقت بررسی و از بین 132 مقاله ارسالی انتخاب شدند. این مقالات در بخشهای موضوعی سازماندهی شدهاند: امنیت فضای سایبری، حفاظت از حریم خصوصی، تشخیص ناهنجاری و نفوذ، محاسبات اعتماد و پزشکی قانونی، حملات و اقدامات متقابل، ارتباطات پنهان، پروتکل امنیتی، ارتباطات ناشناس، امنیت و حریم خصوصی از علوم اجتماعی.
< p>*این کنفرانس به دلیل همهگیری COVID-19 به صورت مجازی برگزار شد.https://www.springer.com/gp/book/9789811591280
Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*.
The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science.
*The conference was held virtually due to the COVID-19 pandemic.
Front Matter ....Pages I-XV
Front Matter ....Pages 1-1
Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature (Yan Xu, Jinxing Ma, Sheng Zhong)....Pages 3-18
Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments (Pu Zhao, Wentao Zhao, Qiang Liu, Anbang Wang)....Pages 19-32
Secure Radio Frequency DCS Watermark-Aided Physical Layer Authentication Design for NB-IoT Systems (Hongqing Huang, Lin Zhang)....Pages 33-49
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4 (Yifang Zhi, Li Yang, Gaolei Yang, Yuehong Zhang)....Pages 50-64
High-Speed Network Attack Detection Framework Based on Optimized Feature Selection (Zhicheng Luo, Weijia Ding, Anmin Fu, Zhiyi Zhang, Linjie Zhang)....Pages 65-78
CaaS: Enabling Congestion Control as a Service to Optimize WAN Data Transfer (Jiahua Zhu, Xianliang Jiang, Guang Jin, Penghui Li)....Pages 79-90
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure (Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu)....Pages 91-99
CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph (Kun Li, Huachun Zhou, Zhe Tu, Bohao Feng)....Pages 100-113
Improvements Based on JWT and RBAC for Spring Security Framework (Gongxuan Zhang, Mingyue Zhang, Xinyi Fan)....Pages 114-128
Front Matter ....Pages 129-129
Decentralizing Privacy-Preserving Data Aggregation Scheme Using Blockchain in Smart Grid (Hongbin Fan, Yining Liu, Zhixin Zeng)....Pages 131-142
Local Differential Privacy for Data Streams (Xianjin Fang, Qingkui Zeng, Gaoming Yang)....Pages 143-160
A Personalized Preservation Mechanism Satisfying Local Differential Privacy in Location-Based Services (Datong Wu, Xiaotong Wu, Jiaquan Gao, Genlin Ji, Xiaolong Xu, Lianyong Qi et al.)....Pages 161-175
Location-Aware Privacy Preserving Scheme in SDN-Enabled Fog Computing (Bruce Gu, Xiaodong Wang, Youyang Qu, Jiong Jin, Yong Xiang, Longxiang Gao)....Pages 176-190
PLFG: A Privacy Attack Method Based on Gradients for Federated Learning (Feng Wu)....Pages 191-204
A Survey of Game Theoretical Privacy Preservation for Data Sharing and Publishing (Datong Wu, Xiaotong Wu, Jiaquan Gao, Genlin Ji, Taotao Wu, Xuyun Zhang et al.)....Pages 205-216
Front Matter ....Pages 217-217
Network Anomaly Detection Using Federated Learning and Transfer Learning (Ying Zhao, Junjun Chen, Qianling Guo, Jian Teng, Di Wu)....Pages 219-231
Variational Autoencoder Based Enhanced Behavior Characteristics Classification for Social Robot Detection (Xiaolong Deng, Zhengge Dai, Mingdong Sun, Tiejun Lv)....Pages 232-248
A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS (Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma)....Pages 249-262
CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection System (Mu Han, Pengzhou Cheng, Shidian Ma)....Pages 263-277
Intrusion Detection Scheme for Autonomous Driving Vehicles (Weidong Zhai, Zhou Su)....Pages 278-291
Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm (Chenjun Tang, Hai Liang, Yong Ding, Yujue Wang, Shijie Tang)....Pages 292-305
Front Matter ....Pages 307-307
Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing (Duo Zhang, Xiaodong Zhang, Sheng Gao, Youliang Tian)....Pages 309-321
Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework (Xiaoxia Jiang, Youliang Tian)....Pages 322-335
A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic Clustering (Shenchen Zhu, Ziyan Zhang, Liquan Chen, Hui Chen, Yanbo Wang)....Pages 336-354
Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage (Shanshan Li, Chunxiang Xu, Yuan Zhang, Xinsheng Wen)....Pages 355-368
Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT (Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang)....Pages 369-383
A Multi-data Collaborative Encryption in Concealed Data Aggregation for WSNs (Li Ma, Jia Geng, Dongchao Ma, Yingxun Fu, Ailing Xiao)....Pages 384-398
Multi-owner Encrypted Ranked Keyword Search Using Machine Learning Techniques (Laila Tul Badar, Chungen Xu, Ali Zakir)....Pages 399-412
Front Matter ....Pages 413-413
Detection of Various Speech Forgery Operations Based on Recurrent Neural Network (Diqun Yan, Tingting Wu)....Pages 415-426
Robust, Imperceptible and End-to-End Audio Steganography Based on CNN (Jie Wang, Rangding Wang, Li Dong, Diqun Yan)....Pages 427-442
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey (Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong)....Pages 443-468
Enhancing Adversarial Examples with Flip-Invariance and Brightness-Invariance (Wanping Liu, Zhaoping Li)....Pages 469-481
MLAB-BiLSTM: Online Web Attack Detection Via Attention-Based Deep Neural Networks (Jun Yang, Mengyu Zhou, Baojiang Cui)....Pages 482-492
A Moving Target Tracking Algorithm Based on Motion State Estimation and Convolutional Neural Network (Yongmei Zhang, Jianzhe Ma, Qian Guo, Weifeng Lv)....Pages 493-517
Detecting Advanced Persistent Threat in Edge Computing via Federated Learning (Zitong Li, Jiale Chen, Jiale Zhang, Xiang Cheng, Bing Chen)....Pages 518-532
Front Matter ....Pages 533-533
Data Computing in Covert Domain (Zhenxing Qian, Zichi Wang, Xinpeng Zhang)....Pages 535-545
Post-processing for Enhancing Audio Steganographic Undetectability (Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan)....Pages 546-559
Steganalysis of Adaptive Steganography Under the Known Cover Image (Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu)....Pages 560-574
Front Matter ....Pages 575-575
Improving Communication Efficiency for Encrypted Distributed Training (Minglu Zhang, Qixian Zhou, Shaopeng Liang, Haomiao Yang)....Pages 577-590
A PoL Protocol for Spatiotemporal Blockchain (Yiwenjin Fu, Huahui Chen, Jiangbo Qian, Yihong Dong)....Pages 591-605
Deep Learning-Based Reverse Method of Binary Protocol (Chenglong Yang, Cai Fu, Yekui Qian, Yao Hong, Guanyun Feng, Lansheng Han)....Pages 606-624
Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure (Shuaishuai Zhu, Yiliang Han)....Pages 625-639
Front Matter ....Pages 641-641
AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking (Pu Wang, Limei He, Zheng Yan, Wei Feng)....Pages 643-660
Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis (Meng Shen, Junxian Duan, Ning Shang, Liehuang Zhu)....Pages 661-675
User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid (Qichao Lai, Li Xu, Manli Yuan, Feng Wang, He Fang)....Pages 676-691
Front Matter ....Pages 693-693
Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought (Jun Hou, Yutao Song, Qianmu Li, Huaqiu Long, Jian Jiang)....Pages 695-710
Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach (Yu Wu, Li Pan, Fang Liu)....Pages 711-725
De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks (Hongyan Zhang, Li Xu, Limei Lin, Xiaoding Wang)....Pages 726-737
User Grouping Privacy-Preserving Strategy Based on Edge Computing for Mobile Crowdsensing (Peng Yang, Yan Zhang, Qiming Wu, Dapeng Wu, Zhidu Li)....Pages 738-749
Back Matter ....Pages 751-753