Security in Computing and Communications [E-Book] : 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers / edited by Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan.
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers present...
Saved in:
Full text |
|
Personal Name(s): | Fan, Chun-I., editor |
Ko, Ryan, editor / Rawat, Danda B., editor / Thampi, Sabu M., editor / Wang, Guojun, editor | |
Edition: |
1st edition 2021. |
Imprint: |
Singapore :
Springer,
2021
|
Physical Description: |
X, 305 pages 33 illustrations (online resource) |
Note: |
englisch |
ISBN: |
9789811604225 |
DOI: |
10.1007/978-981-16-0422-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Communications in Computer and Information Science ;
1364 |
Subject (LOC): |
- Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems
- Evading Static and Dynamic Android Malware Detection Mechanisms
- Multilevel Secure Container Deployment Framework in Edge Computing
- Deep Hierarchical APP Recommendation with Dynamic Behaviors
- New Security Architecture of Access Control in 5G MEC
- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments
- A Survey of Security Attacks on Silicon Based Weak PUF Architectures
- On the Feasibility of DoS Attack on Smart Door Lock IoT Network
- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning
- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection
- Thermal Management in Large Data Centres: Security Threats and Mitigation
- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm
- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data
- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm
- SaaS - Microservices-Based Scalable Smart Contract Architecture
- GIDS: Anomaly Detection Using Generative Adversarial Networks
- Audio Steganography Using Multi LSB and IGS Techniques
- A Forensic Analysis on the Availability of MQTT Network Traffic
- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications
- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.