001455022 000__ 06182cam\a2200613\i\4500 001455022 001__ 1455022 001455022 003__ OCoLC 001455022 005__ 20230314003239.0 001455022 006__ m\\\\\o\\d\\\\\\\\ 001455022 007__ cr\cn\nnnunnun 001455022 008__ 230302s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001455022 019__ $$a1371484137 001455022 020__ $$a9783031220180$$q(electronic bk.) 001455022 020__ $$a3031220188$$q(electronic bk.) 001455022 020__ $$z9783031220173 001455022 020__ $$z303122017X 001455022 0247_ $$a10.1007/978-3-031-22018-0$$2doi 001455022 035__ $$aSP(OCoLC)1371489289 001455022 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP 001455022 049__ $$aISEA 001455022 050_4 $$aQA76.9.A25 001455022 08204 $$a005.8$$223/eng/20230302 001455022 1112_ $$aInternational Conference on Cyber Security, Privacy and Networking$$d(2022 :$$cOnline) 001455022 24510 $$aInternational Conference on Cyber Security, Privacy and Networking (ICSPN 2022) /$$cNadia Nedjah, Gregorio Martínez Pérez, B.B. Gupta, editors. 001455022 2463_ $$aICSPN 2022 001455022 264_1 $$aCham :$$bSpringer,$$c2023. 001455022 300__ $$a1 online resource (454 pages) :$$billustrations (black and white, and colour). 001455022 336__ $$atext$$btxt$$2rdacontent 001455022 337__ $$acomputer$$bc$$2rdamedia 001455022 338__ $$aonline resource$$bcr$$2rdacarrier 001455022 4901_ $$aLecture notes in networks and systems ;$$vvolume 599 001455022 500__ $$aSelected conference papers. 001455022 500__ $$aIncludes author index. 001455022 5050_ $$aIntro -- Preface -- Organization -- Contents -- Data Mining Techniques for Intrusion Detection on the Internet of Things Field -- 1 Introduction -- 2 Related Works -- 3 The Proposed Approach -- 4 Experimental Phase -- 5 Conclusions and Future Works -- References -- Detecting Rumors Transformed from Hong Kong Copypasta -- 1 Introduction -- 2 Existing Works -- 3 Design of Our Copypasta Detection Tool -- 3.1 Overall System Architecture -- 3.2 The Machine Learning Models -- 3.3 User Interface of the Browser Extension -- 4 Evaluation -- 4.1 Performance of the Machine Learning Models 001455022 5058_ $$a4.2 User Evaluation -- 5 Conclusion and Future Work -- References -- Predictive Model Building for Pain Intensity Using Machine Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Feature Selection Process -- 5 Classification -- 6 Conclusion -- References -- Analysis of N-Way K-Shot Malware Detection Using Few-Shot Learning -- 1 Introduction -- 1.1 Literature Review -- 1.2 Research Limitations -- 1.3 Research Contributions -- 2 Methodology -- 2.1 Relation Network -- 2.2 Prototypical Network -- 2.3 Matching Network -- 3 Performance Evaluation and Analysis 001455022 5058_ $$a3.1 Benchmark Datasets for Malware Detection -- 3.2 Performance Evaluation of the Three FSL Approaches -- 4 Conclusion and Future Research Directions -- References -- Efficient Feature Selection Approach for Detection of Phishing URL of COVID-19 Era -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Dataset Collection -- 3.2 Pre-processing -- 3.3 Features Selection and Extraction -- 3.4 Machine Learning Algorithms -- 3.5 Experimental Results and Discussion -- 4 Conclusion and Future Work -- References -- Optimal Feature Selection to Improve Vehicular Network Lifetime 001455022 5058_ $$a1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Methodology -- 4.1 Problem Statement -- 4.2 Proposed Model -- 5 Results and Discussions -- 6 Conclusion and Future Directions -- References -- Machine Learning Based Two-Tier Security Mechanism for IoT Devices Against DDoS Attacks -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 First Stage -- 3.2 Second Stage -- 4 Results and Discussions -- 4.1 Data Set Prepossessing -- 4.2 Analysis -- 5 Conclusion -- References -- An Analysis of Machine Learning Algorithms for Smart Healthcare Systems -- 1 Introduction 001455022 5058_ $$a2 Machine Learning in BioMedical -- 3 Selected and Applied Classifiers -- 3.1 Logistic Regression -- 3.2 KNN (K Nearest Neighbors) -- 3.3 Gaussian Naive Bayes -- 4 Performance Metrics and Result Discussion -- 5 Conclusion -- References -- Blockchains and Cross-Blockchains: Privacy-Preserving Techniques -- 1 Introduction -- 1.1 Contribution -- 2 Blockchain, Cross-Blockchain, and Privacy Security -- 2.1 Blockchain -- 2.2 Cross-Blockchain -- 2.3 Privacy Services -- 3 Privacy-Preserving Techniques -- 3.1 Privacy-Preserving for Blockchain and Cross-Blockchains -- 3.2 Comparison of Techniques 001455022 506__ $$aAccess limited to authorized users. 001455022 520__ $$aThis book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 0911, 2022, in Thailand in online mode. The objective of ICSPN 2022 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community and to provide opportunities to develop creative solutions to various security, privacy and networking problems. 001455022 588__ $$aDescription based on print version record. 001455022 650_0 $$aComputer security$$vCongresses. 001455022 655_0 $$aElectronic books. 001455022 7001_ $$aNedjah, Nadia,$$eeditor.$$1https://isni.org/isni/000000011659274X 001455022 7001_ $$aMartinez Pérez, Gregorio,$$eeditor. 001455022 7001_ $$aGupta, Brij,$$d1982-$$eeditor.$$1https://isni.org/isni/0000000454181601 001455022 77608 $$iPrint version:$$aInternational Conference on Cyber Security, Privacy and Networking (2022 : Online), creator.$$tInternational Conference on Cyber Security, Privacy and Networking (ICSPN 2022).$$dCham : Springer, 2023$$z9783031220173$$w(OCoLC)1359607781 001455022 830_0 $$aLecture notes in networks and systems ;$$vv. 599. 001455022 852__ $$bebk 001455022 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-22018-0$$zOnline Access$$91397441.1 001455022 909CO $$ooai:library.usi.edu:1455022$$pGLOBAL_SET 001455022 980__ $$aBIB 001455022 980__ $$aEBOOK 001455022 982__ $$aEbook 001455022 983__ $$aOnline 001455022 994__ $$a92$$bISE