Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and select...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Meng, Weizhi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Furnell, Steven (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Communications in Computer and Information Science, 1095
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04818nam a2200553 4500
001 978-981-15-0758-8
003 DE-He213
005 20191026102353.0
007 cr nn 008mamaa
008 191023s2019 si | s |||| 0|eng d
020 |a 9789811507588  |9 978-981-15-0758-8 
024 7 |a 10.1007/978-981-15-0758-8  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.59 
072 7 |a UTN  |2 bicssc 
072 7 |a COM043050  |2 bisacsh 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Security and Privacy in Social Networks and Big Data  |h [electronic resource] :  |b 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /  |c edited by Weizhi Meng, Steven Furnell. 
250 |a 1st ed. 2019. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2019. 
300 |a XII, 276 p. 197 illus., 59 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Communications in Computer and Information Science,  |x 1865-0929 ;  |v 1095 
505 0 |a Web Scanner Detection Based on Behavioral Differences -- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation -- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing -- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network -- Development of an Early Warning System for Network Intrusion Detection using Benford's Law Features -- An RTP Extension for Reliable User-data Transmission over VoIP Traffic -- A Hybrid Covert Channel with Feedback over Mobile Networks -- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things -- Integer Version of Ring-LWE and its Applications -- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart devices: A case study -- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu -- Online Event Detection in Social Media with Bursty Event Recognition -- Predicting Users' Emotional Intelligence with Social Networking Data -- Design and Implementation of Medical Dispute Governance Based on Blockchain -- Greedily Remove k links to hide important individuals in social network -- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System -- Blockchain-based Threshold Electronic Voting System -- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication -- Learning from Imbalanced Data: A Comparative Study. . 
520 |a This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer communication systems. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer security. 
650 0 |a Application software. 
650 1 4 |a Mobile and Network Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28050 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 http://scigraph.springernature.com/things/product-market-codes/I18040 
700 1 |a Meng, Weizhi.  |e editor.  |0 (orcid)0000-0003-4384-5786  |1 https://orcid.org/0000-0003-4384-5786  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Furnell, Steven.  |e editor.  |0 (orcid)0000-0003-0984-7542  |1 https://orcid.org/0000-0003-0984-7542  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811507571 
776 0 8 |i Printed edition:  |z 9789811507595 
830 0 |a Communications in Computer and Information Science,  |x 1865-0929 ;  |v 1095 
856 4 0 |u https://doi.org/10.1007/978-981-15-0758-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)