000914771 000__ 04729cam\a2200565Ii\4500 000914771 001__ 914771 000914771 005__ 20230306150541.0 000914771 006__ m\\\\\o\\d\\\\\\\\ 000914771 007__ cr\cn\nnnunnun 000914771 008__ 190924s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000914771 019__ $$a1121266098 000914771 020__ $$a9783030306199$$q(electronic book) 000914771 020__ $$a3030306194$$q(electronic book) 000914771 020__ $$z9783030306182 000914771 0247_ $$a10.1007/978-3-030-30619-9$$2doi 000914771 0247_ $$a10.1007/978-3-030-30 000914771 035__ $$aSP(OCoLC)on1120756220 000914771 035__ $$aSP(OCoLC)1120756220$$z(OCoLC)1121266098 000914771 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dLQU$$dUKMGB$$dOCLCF$$dEBLCP 000914771 049__ $$aISEA 000914771 050_4 $$aQ325.5 000914771 08204 $$a006.3/1$$223 000914771 1112_ $$aML4CS (Conference)$$n(2nd :$$d2019 :$$cXi'an Shi, China) 000914771 24510 $$aMachine learning for cyber security :$$bsecond International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings /$$cXiaofeng Chen, Xinyi Huang, Jun Zhang (eds.). 000914771 2463_ $$aML4CS 2019 000914771 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000914771 300__ $$a1 online resource (xiii, 398 pages) :$$billustrations. 000914771 336__ $$atext$$btxt$$2rdacontent 000914771 337__ $$acomputer$$bc$$2rdamedia 000914771 338__ $$aonline resource$$bcr$$2rdacarrier 000914771 4901_ $$aLecture notes in computer science ;$$v11806 000914771 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000914771 500__ $$aInternational conference proceedings. 000914771 500__ $$aIncludes author index. 000914771 5050_ $$aNetwork Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request Detection Using Character-level CNN -- A LBP Texture Analysis Based Liveness Detection for Face Authentication -- A Survey on Deep Learning Techniques for Privacy-Preserving -- Quantifiable Network Security Measurement: A Study Based on an Index System -- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications -- Password Guessing via Neural Language Modeling -- A Cooperative Placement Method for Machine Learning Workows and Meteorological Big Data Security Protection in Cloud Computing -- A Lightweight Certicateless User Authentication Scheme for the Mobile Environment -- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System -- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones -- An Enumeration-like Vector Sampling Method for Solving Approximate SVP -- Secure Multiparty Learning from Aggregation of Locally Trained Models -- Data-Driven Android Malware Intelligence: A Survey -- Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing -- Content Recognition of Network Traffic Using Wavelet Transform and CNN -- Compositional Information Flow Verification for Inter Application Communications in Android System -- Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System -- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms -- Interpretable Encrypted Searchable Neural Networks -- Game Theory Based Dynamic Defense Mechanism for SDN -- A Visualization-based Analysis on Classifying Android Malware -- Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes -- Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming -- A fair and efficient secret sharing scheme based on cloud assisting -- Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data -- Who Activated My Voice Assistant? A Stealthy Attack on Android phones without Users' Awareness. 000914771 506__ $$aAccess limited to authorized users. 000914771 520__ $$aThis book constitutes the proceedings of the Second International Conference on Machine Learning for Cyber Security, ML4CS 2019, held in Xian, China in September 2019. The 23 revised full papers and 3 short papers presented were carefully reviewed and selected from 70 submissions. The papers detail all aspects of machine learning in network infrastructure security, in network security detections and in application software security. 000914771 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 24, 2019). 000914771 650_0 $$aMachine learning$$vCongresses. 000914771 650_0 $$aComputer security$$vCongresses. 000914771 650_0 $$aInternet$$xSecurity measures$$vCongresses. 000914771 7001_ $$aChen, Xiaofeng,$$d1976-$$eeditor. 000914771 7001_ $$aHuang, Xinyi$$c(Computer scientist),$$eeditor. 000914771 7001_ $$aZhang, Jun,$$eeditor. 000914771 830_0 $$aLecture notes in computer science ;$$v11806. 000914771 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000914771 852__ $$bebk 000914771 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-30619-9$$zOnline Access$$91397441.1 000914771 909CO $$ooai:library.usi.edu:914771$$pGLOBAL_SET 000914771 980__ $$aEBOOK 000914771 980__ $$aBIB 000914771 982__ $$aEbook 000914771 983__ $$aOnline 000914771 994__ $$a92$$bISE