Linked e-resources
Details
Table of Contents
Intro; Contents; ITNG 2018 Organization; General Chair and Editor; Vice General Chair; Track Chairs and Associate Editors; Track Co-Chairs and Session Chairs; Program Committee Members; Conference Secretary; Industry Partnership; Chair Message; List of Reviewers; Part I Cybersecurity; 1 Safeguarding Personal Health Information: Case Study; 1.1 Introduction; 1.2 Proposed Work; 1.3 Findings and Results; 1.4 Conclusions; References; 2 Cybersecurity as People Powered Perpetual Innovation; 2.1 Introduction; 2.2 Leadership; 2.3 People as Expenses; 2.4 Ethical Leadership and Innovation
2.5 Cybersecurity2.6 Cybersecurity Is Interdisciplinary; 2.7 The Role of Governance; 2.8 People Are Our Greatest Strength in Cybersecurity; 2.9 Recommendation; References; 3 Performance Study of the Impact of Security on 802.11ac Networks; 3.1 Introduction; 3.2 Related Research; 3.3 Experimental Setup; 3.4 Discussion of Results; 3.4.1 Throuhgput; 3.4.2 Delay; 3.4.3 Jitter; 3.4.4 Connection Time; 3.4.5 Loss Ratio; 3.5 Conclusion and Future Work; References; 4 Training Neural Tensor Networks with the Never Ending Language Learner; 4.1 Introduction; 4.2 Related Works; 4.3 Method; 4.3.1 NELL
4.3.2 Neural Tensor Network4.4 Experiments; 4.4.1 Dataset and Training Details; 4.4.2 Results; 4.5 Conclusion; References; 5 PERIA-Framework: A Prediction Extension Revision Image Annotation Framework; 5.1 Introduction; 5.2 Background and Motivation; 5.2.1 Automatic Image Annotation; 5.2.2 Manual Image Annotation; 5.2.3 Issues and Motivations; 5.3 PERIA-Framework; 5.3.1 Prediction Mechanism; 5.3.2 Extension Mechanism; 5.3.3 Revision Mechanism; 5.4 PERIA-Framework Instantiation; 5.5 Evaluation and Discussion; 5.6 Conclusion and Future Works; References
6 The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan6.1 Introduction; 6.2 Measures to Provide Information Security in Kazakhstan; 6.3 Overview of Information Security Incidents in Kazakhstan; 6.4 Conclusion; References; 7 Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network; 7.1 UK NHS Information System Infrastructure; 7.2 Threats; 7.3 Vulnerabilities to Identity Management; 7.4 Identity Management Protection; 7.5 Conclusions; References
8 A Virtual Animated Commentator Architecture for Cybersecurity Competitions8.1 Introduction; 8.2 The Commentator Subsystem; 8.2.1 Virtual Commentary Architecture; 8.2.2 Motion Generation; 8.2.3 Speech Generation; 8.3 Preliminary Results; 8.3.1 Generating Expressions and Gestures; 8.3.2 Generate a Marked-up Animation Sequence; 8.4 Related Work; 8.5 Conclusion; References; 9 Malicious Software Classification Using VGG16 Deep Neural Network's Bottleneck Features; 9.1 Introduction; 9.2 Related Work; 9.3 Methodology; 9.3.1 Byteplot Visualization; 9.3.2 VGG16 Architecture; 9.3.3 Transfer Learning
2.5 Cybersecurity2.6 Cybersecurity Is Interdisciplinary; 2.7 The Role of Governance; 2.8 People Are Our Greatest Strength in Cybersecurity; 2.9 Recommendation; References; 3 Performance Study of the Impact of Security on 802.11ac Networks; 3.1 Introduction; 3.2 Related Research; 3.3 Experimental Setup; 3.4 Discussion of Results; 3.4.1 Throuhgput; 3.4.2 Delay; 3.4.3 Jitter; 3.4.4 Connection Time; 3.4.5 Loss Ratio; 3.5 Conclusion and Future Work; References; 4 Training Neural Tensor Networks with the Never Ending Language Learner; 4.1 Introduction; 4.2 Related Works; 4.3 Method; 4.3.1 NELL
4.3.2 Neural Tensor Network4.4 Experiments; 4.4.1 Dataset and Training Details; 4.4.2 Results; 4.5 Conclusion; References; 5 PERIA-Framework: A Prediction Extension Revision Image Annotation Framework; 5.1 Introduction; 5.2 Background and Motivation; 5.2.1 Automatic Image Annotation; 5.2.2 Manual Image Annotation; 5.2.3 Issues and Motivations; 5.3 PERIA-Framework; 5.3.1 Prediction Mechanism; 5.3.2 Extension Mechanism; 5.3.3 Revision Mechanism; 5.4 PERIA-Framework Instantiation; 5.5 Evaluation and Discussion; 5.6 Conclusion and Future Works; References
6 The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan6.1 Introduction; 6.2 Measures to Provide Information Security in Kazakhstan; 6.3 Overview of Information Security Incidents in Kazakhstan; 6.4 Conclusion; References; 7 Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network; 7.1 UK NHS Information System Infrastructure; 7.2 Threats; 7.3 Vulnerabilities to Identity Management; 7.4 Identity Management Protection; 7.5 Conclusions; References
8 A Virtual Animated Commentator Architecture for Cybersecurity Competitions8.1 Introduction; 8.2 The Commentator Subsystem; 8.2.1 Virtual Commentary Architecture; 8.2.2 Motion Generation; 8.2.3 Speech Generation; 8.3 Preliminary Results; 8.3.1 Generating Expressions and Gestures; 8.3.2 Generate a Marked-up Animation Sequence; 8.4 Related Work; 8.5 Conclusion; References; 9 Malicious Software Classification Using VGG16 Deep Neural Network's Bottleneck Features; 9.1 Introduction; 9.2 Related Work; 9.3 Methodology; 9.3.1 Byteplot Visualization; 9.3.2 VGG16 Architecture; 9.3.3 Transfer Learning