000947043 000__ 03398cam\a2200421M\\4500 000947043 001__ 947043 000947043 005__ 20230306152649.0 000947043 006__ m\\\\\o\\d\\\\\\\\ 000947043 007__ cr\un\nnnunnun 000947043 008__ 201222s2021\\\\xx\\\\\\o\\\\\0||\0\eng\d 000947043 019__ $$a1227892554$$a1228844576$$a1232854720 000947043 020__ $$a9783030657451$$q(electronic book) 000947043 020__ $$a3030657450$$q(electronic book) 000947043 020__ $$z3030657442 000947043 020__ $$z9783030657444 000947043 035__ $$aSP(OCoLC)on1228034244 000947043 035__ $$aSP(OCoLC)1228034244 000947043 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dOCLCO$$dUPM$$dOCLCF$$dSNU$$dYDX 000947043 049__ $$aISEA 000947043 1112_ $$aInternational Conference on Network and System Security$$n(14th :$$d2020 :$$cOnline) 000947043 24510 $$aNetwork and system security :$$b14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings /$$cMirosław Kutyłowski, Jun Zhang, Chao Chen (eds.). 000947043 2463_ $$aNSS 2020 000947043 260__ $$aCham :$$bSpringer,$$c2020. 000947043 300__ $$a1 online resource 000947043 336__ $$atext$$btxt$$2rdacontent 000947043 337__ $$acomputer$$bc$$2rdamedia 000947043 338__ $$aonline resource$$bcr$$2rdacarrier 000947043 5050_ $$aData Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes -- Accommodating New Parties -- Multiply, Divide, and Conquer -- Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff. 000947043 506__ $$aAccess limited to authorized users. 000947043 655_0 $$aElectronic books 000947043 7001_ $$aKutyłowski, Mirosław. 000947043 7001_ $$aZhang, Jun. 000947043 7001_ $$aChen, Chao$$c(Computer scientist) 000947043 77608 $$iPrint version:$$z3030657442$$z9783030657444$$w(OCoLC)1206236469 000947043 852__ $$bebk 000947043 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-65745-1$$zOnline Access$$91397441.1 000947043 909CO $$ooai:library.usi.edu:947043$$pGLOBAL_SET 000947043 980__ $$aEBOOK 000947043 980__ $$aBIB 000947043 982__ $$aEbook 000947043 983__ $$aOnline 000947043 994__ $$a92$$bISE