001440804 000__ 05182cam\a2200673\a\4500 001440804 001__ 1440804 001440804 003__ OCoLC 001440804 005__ 20230309004703.0 001440804 006__ m\\\\\o\\d\\\\\\\\ 001440804 007__ cr\un\nnnunnun 001440804 008__ 211106s2021\\\\sz\\\\\\o\\\\\101\0\eng\d 001440804 019__ $$a1292518008$$a1294368322 001440804 020__ $$a9783030900199$$q(electronic bk.) 001440804 020__ $$a3030900193$$q(electronic bk.) 001440804 020__ $$z9783030900182 001440804 0247_ $$a10.1007/978-3-030-90019-9$$2doi 001440804 035__ $$aSP(OCoLC)1283849117 001440804 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dOCLCF$$dOCLCO$$dDKU$$dDCT$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dUKAHL$$dOCLCQ 001440804 049__ $$aISEA 001440804 050_4 $$aQA76.9.A25 001440804 08204 $$a005.8$$223 001440804 1112_ $$aInternational Conference on Security and Privacy for Emerging Areas in Communications Networks$$n(17th :$$d2021 :$$cOnline) 001440804 24510 $$aSecurity and privacy in communication networks :$$b17th EAI International Conference, SecureComm 2021, Virtual event, September 6-9, 2021, Proceedings.$$nPart I /$$cJoaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung (eds.). 001440804 2463_ $$aSecureComm 2021 001440804 260__ $$aCham :$$bSpringer,$$c2021. 001440804 300__ $$a1 online resource (547 pages) 001440804 336__ $$atext$$btxt$$2rdacontent 001440804 337__ $$acomputer$$bc$$2rdamedia 001440804 338__ $$aonline resource$$bcr$$2rdacarrier 001440804 347__ $$atext file 001440804 347__ $$bPDF 001440804 4901_ $$aLecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;$$v398 001440804 500__ $$aIncludes author index. 001440804 5050_ $$aCyber Threats and Defence -- DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting -- SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management -- Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces -- Towards Automated Assessment of Vulnerability Exposures in Security Operations -- Repeatable Experimentation for Cybersecurity Moving Target Defense -- MPD: Moving Target Defense through Communication Protocol Dialects -- Blockchain and P2P Security 7 GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks -- n Extensive Security Analysis on Ethereum Smart Contracts -- A Distributed Ledger for Non-Attributable Cyber Threat Intelligence Exchange -- AI and Security/Privacy 10 Understanding ff for Differential Privacy in Differencing Attack Scenarios -- ToFi: An Algorithm to Defend against Byzantine Attacks in Federated Learning -- TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator -- Research of CPA Attack Methods based on Ant Colony Algorithm -- Local Model Privacy-preserving Study for Federated Learning -- Applied Cryptography 16 Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery -- Cryptonomial: A Framework for Private Time-Series Polynomial Calculations -- Provably Secure Contact Tracing with Conditional Private Set Intersection -- Origin Attribution of RSA Public Keys -- Network Security 20 Fine-grained Intra-domain Bandwidth Allocation against DDoS Attack. 001440804 506__ $$aAccess limited to authorized users. 001440804 520__ $$aThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. 001440804 588__ $$aDescription based on print version record. 001440804 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 15, 2021). 001440804 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001440804 650_0 $$aData encryption (Computer science)$$vCongresses. 001440804 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001440804 650_6 $$aChiffrement (Informatique)$$vCongrès. 001440804 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440804 655_7 $$aConference papers and proceedings.$$2lcgft 001440804 655_7 $$aActes de congrès.$$2rvmgf 001440804 655_0 $$aElectronic books. 001440804 7001_ $$aGarcia-Alfaro, Joaquin. 001440804 7001_ $$aLi, Shujun$$c(Writer on computer security) 001440804 7001_ $$aPoovendran, Radha. 001440804 7001_ $$aDebar, Hervé,$$d1961- 001440804 7001_ $$aYung, Moti. 001440804 77608 $$iPrint version:$$aGarcia-Alfaro, Joaquin.$$tSecurity and Privacy in Communication Networks.$$dCham : Springer International Publishing AG, ©2021$$z9783030900182 001440804 830_0 $$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$$vv. 398. 001440804 852__ $$bebk 001440804 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-90019-9$$zOnline Access$$91397441.1 001440804 909CO $$ooai:library.usi.edu:1440804$$pGLOBAL_SET 001440804 980__ $$aBIB 001440804 980__ $$aEBOOK 001440804 982__ $$aEbook 001440804 983__ $$aOnline 001440804 994__ $$a92$$bISE