Название: Security with Intelligent Computing and Big-data Services Автор: Sheng-Lung Peng (et al.) Издательство: Springer International Publishing Год: 2018 ISBN: 978-3-319-76450-4 Формат: pdf Страниц: XVI, 372 Размер: 52,1 mb Язык: English
In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.
A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition Zhang, Hao (et al.) Pages 3-13
Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space Hu, Yan-Hong (et al.) Pages 14-19
A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM Li, Li (et al.) Pages 20-32
Compact Cat Swarm Optimization Algorithm Zhao, Ming (et al.) Pages 33-43
Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns Chou, Chao-Lung (et al.) Pages 47-56
A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset Liao, Jheng-Mo (et al.) Pages 57-69
Mitigating DoS Attacks in SDN Using Offloading Path Strategies Huang, Tai-Siang (et al.) Pages 70-78
An Extension of Attack Trees Kao, Yi-Chih (et al.) Pages 79-85
Face Detection in a Complex Background Using Cascaded Conventional Networks Li, Jianjun (et al.) Pages 86-97
Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme Tseng, Yi-Fan (et al.) Pages 98-104
Overlapping Community Detection with Two-Level Expansion by Local Clustering Coefficients Su, Yi-Jen (et al.) Pages 105-112
Writing Security Specification with Things That Flow Al-Fedaghi, Sabah (et al.) Pages 115-125
Automatically Generating Aspect Taxonomy for E-Commerce Domains to Assist Sentiment Mining Chockalingam, Nachiappan Pages 126-137
History Management for Network Information of IoT Devices Jang, Daeil (et al.) Pages 138-145
A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy Lin, Iuon-Chang (et al.) Pages 149-160
Privacy-Preserving Outsource Computing for Binary Vector Similarity Yang, Dan (et al.) Pages 161-169
Strategies to Improve Auditing Performance and Soundness for Cloud Computation Hwang, Shin-Jia (et al.) Pages 170-182
Reversible Image Steganography for Color Image Quantization Based on Lossless Index Coding Hu, Yu-Chen (et al.) Pages 185-195
Capacity on Demand Steganography Through Adaptive Threshold Strategy Ho, Sheng-Chih (et al.) Pages 196-205
Shamir’s Secret Sharing Scheme in Parallel Shyu, Shyong Jian (et al.) Pages 206-216
A Cognitive Global Clock Synchronization Protocol in WSNs Ahmad, Bilal (et al.) Pages 219-231
A Generic Web Application Testing and Attack Data Generation Method Shih, Hsiao-Yu (et al.) Pages 232-247
The Study of Improvement and Risk Evaluation for Mobile Application Security Testing Lin, Huey-Yeh (et al.) Pages 248-256
Application of Pattern for New CAPTCHA Generation Idea Lawan, Thawatwong Pages 257-264
An Automatic Approach of Building Threat Patterns in Android Chen, Chia-Mei (et al.) Pages 267-274
Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics Kao, Da-Yu (et al.) Pages 275-285
Ant-Based Botnet C&C Server Traceback Chen, Chia-Mei (et al.) Pages 286-292
T-Brain: A Collaboration Platform for Data Scientists Yeh, Chao-Chun (et al.) Pages 295-309
Feature Extraction in Security Analytics: Reducing Data Complexity with Apache Spark Sisiaridis, Dimitrios (et al.) Pages 310-321
Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids Fan, Chun-I (et al.) Pages 322-329
Verifying the Validity of Public Key Certificates Using Edge Computing Kitajima, Shogo (et al.) Pages 330-336
A Study on Blockchain-Based Circular Economy Credit Rating System Wu, Hsin-Te (et al.) Pages 339-343
Using Blockchain to Support Data and Service Management in IoV/IoT Odiete, Obaro (et al.) Pages 344-362
A Blockchain-Based Traceable Certification System Chang, Po-Yeuan (et al.) Pages 363-369
|