Frontiers in Cyber Security : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings (Communications in Computer and Information Science)

個数:
  • ポイントキャンペーン

Frontiers in Cyber Security : 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 400 p.
  • 言語 ENG
  • 商品コード 9789811984440

Full Description

This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. 
The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.

Contents

IoT Security.- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT.- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles.- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building.- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things.- Artificial Intelligence and Cyber Security.- Cross-site Scripting Threat Intelligence Detection based on Deep Learning.- Power Analysis Attack Based on Lightweight Convolutional Neural Network.- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms.- SVFLS: A Secure and Verifiable Federated Learning Training Scheme.- A Pragmatic Label-Specific Backdoor Attack.- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source.- Blockchain Technology and Application.- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment.- Blockchain-based Patient-to-Patient Health Data Sharing.- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain.- Ethereum Contract Honeypot Risk Analysis.- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains.- Cryptography.- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme.- New Trapdoor and Preimage Sampling on NTRU Lattice.- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature.- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares.- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.- Database Security.- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme.- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern.- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing.- Quantum Cryptography.- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate.- Network Security.- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.