001431599 000__ 03338nam\a2200541\i\4500 001431599 001__ 1431599 001431599 003__ OCoLC 001431599 005__ 20230308003243.0 001431599 006__ m\\\\\o\\d\\\\\\\\ 001431599 007__ cr\un\nnnunnun 001431599 008__ 230125s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001431599 020__ $$a9783031240492$$q(electronic bk.) 001431599 020__ $$a3031240499$$q(electronic bk.) 001431599 020__ $$z9783031240485 001431599 0247_ $$a10.1007/978-3-031-24049-2$$2doi 001431599 035__ $$aSP(OCoLC)1365390247 001431599 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE 001431599 049__ $$aISEA 001431599 050_4 $$aQA76.9.A25 001431599 08204 $$a005.8$$223/eng/20230125 001431599 1112_ $$aSVCC (Conference)$$n(3rd :$$d2022 :$$cOnline) 001431599 24510 $$aSilicon Valley Cybersecurity Conference :$$bthird conference, SVCC 2022, Virtual event, August 17-19, 2022, Revised selected papers /$$cLuis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson (eds.). 001431599 2463_ $$aSVCC 2022 001431599 264_1 $$aCham :$$bSpringer,$$c2022. 001431599 300__ $$a1 online resource (ix, 137 pages) :$$billustrations (some color). 001431599 336__ $$atext$$btxt$$2rdacontent 001431599 337__ $$acomputer$$bc$$2rdamedia 001431599 338__ $$aonline resource$$bcr$$2rdacarrier 001431599 4901_ $$aCommunications in computer and information science,$$x1865-0937 ;$$v1683 001431599 500__ $$aIncludes author index. 001431599 5050_ $$aMalware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning. 001431599 5060_ $$aOpen access.$$5GW5XE 001431599 520__ $$aThis open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17-19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book. 001431599 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 25, 2023). 001431599 650_0 $$aComputer security$$vCongresses. 001431599 655_0 $$aElectronic books. 001431599 7001_ $$aBathen, Luis,$$eeditor.$$0(orcid)0000-0002-5756-4953$$1https://orcid.org/0000-0002-5756-4953 001431599 7001_ $$aSaldamli, Gokay,$$eeditor.$$0(orcid)0000-0002-9354-3228$$1https://orcid.org/0000-0002-9354-3228 001431599 7001_ $$aSun, Xiaoyan,$$eeditor.$$0(orcid)0000-0002-0321-2338$$1https://orcid.org/0000-0002-0321-2338 001431599 7001_ $$aAustin, Thomas H.$$eeditor.$$0(orcid)0000-0003-2428-0687$$1https://orcid.org/0000-0003-2428-0687 001431599 7001_ $$aNelson, Alex J.$$eeditor.$$0(orcid)0000-0002-3771-570X$$1https://orcid.org/0000-0002-3771-570X 001431599 830_0 $$aCommunications in computer and information science ;$$v1683.$$x1865-0937 001431599 852__ $$bebk 001431599 85640 $$3Springer Nature$$uhttps://link.springer.com/10.1007/978-3-031-24049-2$$zOnline Access$$91397441.2 001431599 909CO $$ooai:library.usi.edu:1431599$$pGLOBAL_SET 001431599 980__ $$aBIB 001431599 980__ $$aEBOOK 001431599 982__ $$aEbook 001431599 983__ $$aOnline 001431599 994__ $$a92$$bISE