000899089 000__ 05655cam\a2200565Mi\4500 000899089 001__ 899089 000899089 005__ 20230306150200.0 000899089 006__ m\\\\\o\\d\\\\\\\\ 000899089 007__ cr\nn\nnnunnun 000899089 008__ 190725s2019\\\\gw\\\\\\o\\\\\000\0\eng\d 000899089 019__ $$a1113437775 000899089 020__ $$a9783030242657 000899089 020__ $$a303024265X 000899089 020__ $$z9783030242640 000899089 0247_ $$a10.1007/978-3-030-24 000899089 0247_ $$a10.1007/978-3-030-24265-7$$2doi 000899089 035__ $$aSP(OCoLC)on1110224044 000899089 035__ $$aSP(OCoLC)1110224044$$z(OCoLC)1113437775 000899089 040__ $$aLQU$$beng$$cLQU$$dGZM$$dDKU$$dYDXIT$$dGW5XE 000899089 049__ $$aISEA 000899089 050_4 $$aQA76.9.A25$$bI23 2019 000899089 08204 $$a005.8 000899089 24500 $$aArtificial Intelligence and Security :$$b5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II /$$cedited by Xingming Sun, Zhaoqing Pan, Elisa Bertino. 000899089 250__ $$a1st ed. 2019. 000899089 264_1 $$aCham :$$bSpringer International Publishing,$$c2019 ;$$bImprint Springer. 000899089 300__ $$a1 online resource (xvii, 665 pages) :$$billustrations. 000899089 336__ $$atext$$btxt$$2rdacontent 000899089 337__ $$acomputer$$bc$$2rdamedia 000899089 338__ $$aonline resource$$bcr$$2rdacarrier 000899089 347__ $$atext file$$bPDF$$2rda 000899089 4901_ $$aLecture notes in computer science$$v11633 000899089 4901_ $$aLNCS sublibrary: SL4 - security and cryptology 000899089 504__ $$aIncludes author index. 000899089 5050_ $$a- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping ystems -- Task Scheduling Algorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimization of Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems -- Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation. 000899089 506__ $$aAccess limited to authorized users. 000899089 520__ $$aThe 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. 000899089 650_0 $$aArtificial intelligence$$vCongresses. 000899089 650_0 $$aCloud computing$$xSecurity measures$$vCongresses. 000899089 7001_ $$aSun, Xingming. 000899089 7001_ $$aPan, Zhaoqing. 000899089 7001_ $$aBertino, Elisa. 000899089 77608 $$iPrint version: $$z9783030242640 000899089 830_0 $$aLecture notes in computer science ;$$v11633. 000899089 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000899089 852__ $$bebk 000899089 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-24271-8$$zOnline Access$$91397441.1 000899089 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-24265-7$$zOnline Access$$91397441.1 000899089 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-24268-8$$zOnline Access$$91397441.1 000899089 909CO $$ooai:library.usi.edu:899089$$pGLOBAL_SET 000899089 980__ $$aEBOOK$$aEBOOK$$aEBOOK 000899089 980__ $$aBIB 000899089 982__ $$aEbook 000899089 983__ $$aOnline 000899089 994__ $$a92$$bISE