Security and Privacy in Communication Networks [E-Book] : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I / edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were care...
Saved in:
Full text |
|
Personal Name(s): | Debar, Hervé, editor |
Garcia-Alfaro, Joaquin, editor / Li, Shujun, editor / Poovendran, Radha, editor / Yung, Moti, editor | |
Edition: |
1st edition 2021. |
Imprint: |
Cham :
Springer,
2021
|
Physical Description: |
XVII, 539 pages 169 illustrations, 125 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030900199 |
DOI: |
10.1007/978-3-030-90019-9 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
398 |
Subject (LOC): |
- Cyber Threats and Defence
- DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting
- SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management
- Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces
- Towards Automated Assessment of Vulnerability Exposures in Security Operations
- Repeatable Experimentation for Cybersecurity Moving Target Defense
- MPD: Moving Target Defense through Communication Protocol Dialects
- Blockchain and P2P Security 7 GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks
- n Extensive Security Analysis on Ethereum Smart Contracts
- A Distributed Ledger for Non-Attributable Cyber Threat Intelligence Exchange
- AI and Security/Privacy 10 Understanding ff for Differential Privacy in Differencing Attack Scenarios
- ToFi: An Algorithm to Defend against Byzantine Attacks in Federated Learning
- TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator
- Research of CPA Attack Methods based on Ant Colony Algorithm
- Local Model Privacy-preserving Study for Federated Learning
- Applied Cryptography 16 Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery
- Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
- Provably Secure Contact Tracing with Conditional Private Set Intersection
- Origin Attribution of RSA Public Keys
- Network Security 20 Fine-grained Intra-domain Bandwidth Allocation against DDoS Attack.