001433809 000__ 05349cam\a2200793\i\4500 001433809 001__ 1433809 001433809 003__ OCoLC 001433809 005__ 20230309003654.0 001433809 006__ m\\\\\o\\d\\\\\\\\ 001433809 007__ cr\cn\nnnunnun 001433809 008__ 210211s2021\\\\si\\\\\\ob\\\\101\0\eng\d 001433809 019__ $$a1237404674$$a1241066216$$a1243412674$$a1244116836$$a1249943402 001433809 020__ $$a9789811604225$$q(electronic bk.) 001433809 020__ $$a9811604223$$q(electronic bk.) 001433809 020__ $$z9811604215 001433809 020__ $$z9789811604218 001433809 0247_ $$a10.1007/978-981-16-0422-5$$2doi 001433809 035__ $$aSP(OCoLC)1237308717 001433809 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dYDXIT$$dGW5XE$$dOCLCO$$dEBLCP$$dDKU$$dDCT$$dOCLCF$$dLEATE$$dBDX$$dUKMGB$$dUKAHL$$dOCLCO$$dOCLCQ$$dOCLCO$$dCOM$$dOCLCQ 001433809 049__ $$aISEA 001433809 050_4 $$aQA76.9.A25 001433809 08204 $$a005.8$$223 001433809 1112_ $$aSSCC (Conference)$$n(8th :$$d2020 :$$cOnline) 001433809 24510 $$aSecurity in computing and communications :$$b8th international symposium, SSCC 2020, Chennai, India, October 14-17, 2020 : revised selected papers /$$cSabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan (eds.). 001433809 24630 $$aSSCC 2020 001433809 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001433809 300__ $$a1 online resource 001433809 336__ $$atext$$btxt$$2rdacontent 001433809 337__ $$acomputer$$bc$$2rdamedia 001433809 338__ $$aonline resource$$bcr$$2rdacarrier 001433809 347__ $$atext file 001433809 347__ $$bPDF 001433809 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v1364 001433809 500__ $$aInternational conference proceedings. 001433809 500__ $$aIncludes author index. 001433809 504__ $$aIncludes bibliographical references and index. 001433809 5050_ $$aPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS -- Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. 001433809 506__ $$aAccess limited to authorized users. 001433809 520__ $$aThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. 001433809 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 16, 2021). 001433809 650_0 $$aComputer security$$vCongresses. 001433809 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001433809 650_0 $$aData encryption (Computer science) 001433809 650_0 $$aComputer networks. 001433809 650_0 $$aApplication software. 001433809 650_0 $$aComputer architecture. 001433809 650_6 $$aSécurité informatique$$vCongrès. 001433809 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001433809 650_6 $$aChiffrement (Informatique) 001433809 650_6 $$aRéseaux d'ordinateurs. 001433809 650_6 $$aLogiciels d'application. 001433809 650_6 $$aOrdinateurs$$xArchitecture. 001433809 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001433809 655_7 $$aConference papers and proceedings.$$2lcgft 001433809 655_7 $$aActes de congrès.$$2rvmgf 001433809 655_0 $$aElectronic books. 001433809 7001_ $$aThampi, Sabu M.,$$eeditor. 001433809 7001_ $$aWang, Guojun$$c(Computer scientist),$$eeditor. 001433809 7001_ $$aRawat, Danda B.,$$d1977-$$eeditor. 001433809 7001_ $$aKo, Ryan,$$eeditor. 001433809 7001_ $$aFan, Chun-I,$$eeditor. 001433809 830_0 $$aCommunications in computer and information science ;$$v1364.$$x1865-0929 001433809 852__ $$bebk 001433809 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-16-0422-5$$zOnline Access$$91397441.1 001433809 909CO $$ooai:library.usi.edu:1433809$$pGLOBAL_SET 001433809 980__ $$aBIB 001433809 980__ $$aEBOOK 001433809 982__ $$aEbook 001433809 983__ $$aOnline 001433809 994__ $$a92$$bISE