000913060 000__ 05718cam\a2200517Ii\4500 000913060 001__ 913060 000913060 005__ 20230306150407.0 000913060 006__ m\\\\\o\\d\\\\\\\\ 000913060 007__ cr\cn\nnnunnun 000913060 008__ 190725s2019\\\\sz\\\\\\o\\\\\001\0\eng\d 000913060 019__ $$a1112894099$$a1117490318$$a1119473608$$a1119981410 000913060 020__ $$a9783030242718$$q(electronic book) 000913060 020__ $$a3030242714$$q(electronic book) 000913060 020__ $$z9781522573531 000913060 0248_ $$a10.1007/978-3-030-24 000913060 035__ $$aSP(OCoLC)on1110318887 000913060 035__ $$aSP(OCoLC)1110318887$$z(OCoLC)1112894099$$z(OCoLC)1117490318$$z(OCoLC)1119473608$$z(OCoLC)1119981410 000913060 040__ $$aLQU$$beng$$erda$$cLQU$$dDKU$$dGW5XE$$dOCLCF$$dYDXIT$$dUKMGB 000913060 049__ $$aISEA 000913060 050_4 $$aQ334$$b.A78 2019 000913060 08204 $$a005.8$$223 000913060 24500 $$aArtificial intelligence and security :$$b5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, proceedings.$$nPart III /$$cXingming Sun, Zhaoqing Pan, Elisa Bertino (Eds.). 000913060 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2019] 000913060 300__ $$a1 online resource 000913060 336__ $$atext$$btxt$$2rdacontent 000913060 337__ $$acomputer$$bc$$2rdamedia 000913060 338__ $$aonline resource$$bcr$$2rdacarrier 000913060 4901_ $$aLecture notes in computer science ;$$v11634 000913060 4901_ $$aLNCS sublibrary: SL4 -- security and cryptology 000913060 500__ $$aIncludes index. 000913060 504__ $$aIncludes bibliographical references and author index. 000913060 5050_ $$aIon -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique ign of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformat. 000913060 506__ $$aAccess limited to authorized users. 000913060 520__ $$aThe 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. 000913060 588__ $$aDescription based on online resource; title from digital title page (viewed on September 04, 2019). 000913060 650_0 $$aArtificial intelligence$$vCongresses. 000913060 650_0 $$aCloud computing$$xSecurity measures$$vCongresses. 000913060 7001_ $$aSun, Xingming,$$eeditor. 000913060 7001_ $$aPan, Zhaoqing,$$eeditor. 000913060 7001_ $$aBertino, Elisa,$$eeditor. 000913060 830_0 $$aLecture notes in computer science ;$$v11634. 000913060 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000913060 852__ $$bebk 000913060 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-24271-8$$zOnline Access$$91397441.1 000913060 909CO $$ooai:library.usi.edu:913060$$pGLOBAL_SET 000913060 980__ $$aEBOOK 000913060 980__ $$aBIB 000913060 982__ $$aEbook 000913060 983__ $$aOnline 000913060 994__ $$a92$$bISE