Advances in Security, Networks, and Internet of Things : Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Transactions on Computational Science and Computational Intelligence)

個数:

Advances in Security, Networks, and Internet of Things : Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Transactions on Computational Science and Computational Intelligence)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 874 p.
  • 商品コード 9783030710163

Full Description

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students.

Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20);
Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems;
Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.

Contents

Statistical Analysis of Prime Number Generators Putting Encryption at Risk.- Secure Authentication Protocol for Drones in LTE Networks.- Memorable Password Generation with AES in ECB Mod.- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model.- Suitability of Voice Recognition within the IoT Environment.- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World.- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies.- Phishing Prevention Using Defense in Depth.- Phishing Detection using Deep Learning.- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach.- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack.- Intrusion Detection through Gradient in Digraphs.- A Practice of Detecting Insider Threats within a Network.- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications.- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security.- Enhancing the Cybersecurity Education Curricula Through Quantum Computation.- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program.- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics.- A Posteriori Access Control with an Administrative Policy.- An Analysis of Applying STIR/Shaken to Prevent Robocalls.- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid.- Vulnerability Analysis of 2500 Docker Hub Images.-  Analysis of Conpot and its BACnet Features for Cyber-Deception.- Automotive Vehicle Security Metrics.- Requirements for IoT Forensic Models - A Review.- Mobile Malware Forensics Review: Issues and Challenges.- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review.- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach.- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices.- Leveraging Security Management with Low-Level System Monitoring and Visualization.- Lightweight Network Steganography for Distributed Electronic Warfare System Communications.- Security of DBMSs.- Static Analysis for Software Reliability and Security.

最近チェックした商品