001444716 000__ 05367cam\a2200589Ii\4500 001444716 001__ 1444716 001444716 003__ OCoLC 001444716 005__ 20230310003724.0 001444716 006__ m\\\\\o\\d\\\\\\\\ 001444716 007__ cr\un\nnnunnun 001444716 008__ 220302s2022\\\\si\a\\\\o\\\\\101\0\eng\d 001444716 020__ $$a9789811904684$$q(electronic bk.) 001444716 020__ $$a9811904685$$q(electronic bk.) 001444716 020__ $$z9789811904677$$q(print) 001444716 0247_ $$a10.1007/978-981-19-0468-4$$2doi 001444716 035__ $$aSP(OCoLC)1301274029 001444716 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCO$$dOCLCF$$dOCLCO$$dUKAHL$$dOCLCQ 001444716 049__ $$aISEA 001444716 050_4 $$aQA76.9.A25 001444716 08204 $$a005.8$$223 001444716 1112_ $$aInternational Conference on Ubiquitous Security$$n(1st :$$d2021 :$$cGuangzhou, China) 001444716 24510 $$aUbiquitous security :$$bfirst International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised selected papers /$$cGuojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo (eds.). 001444716 2463_ $$aUbiSec 2021 001444716 264_1 $$aSingapore :$$bSpringer,$$c2022. 001444716 300__ $$a1 online resource (xvii, 380 pages) :$$billustrations (some color). 001444716 336__ $$atext$$btxt$$2rdacontent 001444716 337__ $$acomputer$$bc$$2rdamedia 001444716 338__ $$aonline resource$$bcr$$2rdacarrier 001444716 4901_ $$aCommunications in computer and information science,$$x1865-0937 ;$$v1557 001444716 500__ $$aIncludes author index. 001444716 5050_ $$aA Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks -- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning -- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes -- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm -- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem -- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks -- Smart Search over Encrypted Educational Resources in Cloud Storage -- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets -- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media -- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network -- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity -- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System -- Skill Reward for Safe Deep Reinforcement Learning -- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks -- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System. 001444716 506__ $$aAccess limited to authorized users. 001444716 520__ $$aThis volume constitutes selected papers presented at the First International Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks. 001444716 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 2, 2022). 001444716 650_0 $$aComputer security$$vCongresses. 001444716 650_0 $$aUbiquitous computing$$vCongresses. 001444716 650_6 $$aSécurité informatique$$vCongrès. 001444716 650_6 $$aInformatique omniprésente$$vCongrès. 001444716 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001444716 655_0 $$aElectronic books. 001444716 7001_ $$aWang, Guojun$$c(Computer scientist),$$eeditor.$$1https://orcid.org/0000-0001-9875-4182 001444716 7001_ $$aChoo, Kim-Kwang Raymond,$$eeditor.$$1https://orcid.org/0000-0001-9208-5336 001444716 7001_ $$aKo, Ryan,$$eeditor.$$1https://orcid.org/0000-0003-0804-1176 001444716 7001_ $$aXu, Yang,$$eeditor.$$0(orcid)0000-0002-3194-8369$$1https://orcid.org/0000-0002-3194-8369 001444716 7001_ $$aCrispo, Bruno,$$eeditor.$$1https://orcid.org/0000-0002-1252-8465 001444716 830_0 $$aCommunications in computer and information science ;$$v1557.$$x1865-0937 001444716 852__ $$bebk 001444716 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-0468-4$$zOnline Access$$91397441.1 001444716 909CO $$ooai:library.usi.edu:1444716$$pGLOBAL_SET 001444716 980__ $$aBIB 001444716 980__ $$aEBOOK 001444716 982__ $$aEbook 001444716 983__ $$aOnline 001444716 994__ $$a92$$bISE