000913323 000__ 07153cam\a2200625Ii\4500 000913323 001__ 913323 000913323 005__ 20230306150422.0 000913323 006__ m\\\\\o\\d\\\\\\\\ 000913323 007__ cr\cn\nnnunnun 000913323 008__ 190710s2019\\\\sz\\\\\\o\\\\\101\0\eng\d 000913323 019__ $$a1115110144 000913323 020__ $$a9783030242688$$q(electronic book) 000913323 020__ $$a3030242684$$q(electronic book) 000913323 020__ $$z9783030242671 000913323 020__ $$a3030242676 000913323 020__ $$a9783030242671 000913323 020__ $$a9783030242695 000913323 020__ $$a3030242692 000913323 0247_ $$a10.1007/978-3-030-24268-8$$2doi 000913323 035__ $$aSP(OCoLC)on1113425157 000913323 035__ $$aSP(OCoLC)1113425157$$z(OCoLC)1115110144 000913323 040__ $$aDKU$$beng$$erda$$cDKU$$dYDXIT$$dGW5XE$$dVT2$$dUPM 000913323 049__ $$aISEA 000913323 050_4 $$aQA76.9.A25$$bI23 2019 000913323 08204 $$a005.8$$223 000913323 1112_ $$aInternational Conference on Artificial Intelligence and Security$$n(5th :$$d2019 :$$cNew York, N.Y.) 000913323 24510 $$aArtificial intelligence and security :$$b5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, proceedings.$$nPart IV /$$cXingming Sun, Zhaoqing Pan, Elisa Bertino (Eds.). 000913323 2463_ $$aICAIS 2019 000913323 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2019] 000913323 300__ $$a1 online resource 000913323 336__ $$atext$$btxt$$2rdacontent 000913323 337__ $$acomputer$$bc$$2rdamedia 000913323 338__ $$aonline resource$$bcr$$2rdacarrier 000913323 347__ $$atext file$$bPDF$$2rda 000913323 4901_ $$aLecture notes in computer science$$v11635 000913323 4901_ $$aLNCS sublibrary: SL4 - security and cryptology 000913323 500__ $$aFormerly the International Conference on Cloud Computing and Security. 000913323 500__ $$aInternational conference proceedings. 000913323 504__ $$aIncludes author index. 000913323 5050_ $$aEncryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- ^Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- ^A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- ^Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning 000913323 506__ $$aAccess limited to authorized users. 000913323 520__ $$aThe 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. --$$cProvided by publisher. 000913323 588__ $$aDescription based on online resource; title from digital title page (viewed on August 26, 2019). 000913323 650_0 $$aArtificial intelligence$$vCongresses. 000913323 650_0 $$aCloud computing$$xSecurity measures$$vCongresses. 000913323 7001_ $$aSun, Xingming,$$eeditor. 000913323 7001_ $$aPan, Zhaoqing,$$eeditor. 000913323 7001_ $$aBertino, Elisa,$$eeditor. 000913323 77608 $$iPrint version:$$z9783030242671 000913323 830_0 $$aLecture notes in computer science ;$$v11635. 000913323 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000913323 852__ $$bebk 000913323 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-24268-8$$zOnline Access$$91397441.1 000913323 909CO $$ooai:library.usi.edu:913323$$pGLOBAL_SET 000913323 980__ $$aEBOOK 000913323 980__ $$aBIB 000913323 982__ $$aEbook 000913323 983__ $$aOnline 000913323 994__ $$a92$$bISE