- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26-28, 2024.
The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: -
Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario.
Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation.
Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.
Contents
.- Attack Methodology in the Evaluation .
.- Directed Symbolic Execution Tool Based on Clang Static Analyzer: Efficient and Accurate Verification of Static Analysis Results.
.- A Survey on Covert Network Attack.
.- Review of Path Planning and Decision-Making in Automated Penetration Testing.
.- Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph.
.- A Self-evolution Attack Tree Method Based on the MDATA Model for Attack Tactics Recommendation.
.- WFSCK: An Intelligent File System Check Recovery and Task Management Framework.
.- Power Analysis Attack Based on Chosen-plaintext.
.- Modeling and Assessing The Attack Behaviour of Weak Passwords Based on Attack Graph.
.- Other Simulation and Evaluation methods.
.- A Multispectral Pedestrian Detection Method Based on Feature Fusion.
.- Localization of small targets in smart grain warehouse based on VAE-LSTM.
.- Hybrid Indexing for Label-Constrained Reachability on Temporal Property Graphs.
.- Reverse Method for DGA Based on Generative BiLSTM Model.
.- Enhancing Cross-Domain Data Analytics through MultiSource Transfer Learning.
.- A novel image encryption algorithm based on chaotic tent mapping.
.- A Comparative Testing of Object Detection Model based on Adversarial Examples.
.- Exploring Occupational Gender Bias in Large Language Models of High-Resource Language.
.- FEDGA:FL with Dynamic Gradient and Group Normalization.
.- Evaluation Theory and Methodology.
.- Review of Fuzz Testing Techniques for Database Management Systems.
.- Correlation Analysis of Tor Traffic Based on RAINBOW Scheme in Cloud Computing Environment.
.- A hybrid framework for effective and efficient machine unlearning.
.- Enhancing Mixnets Security: Detecting and Isolating Malicious Nodes While Forcing Adversaries into Strategic Trade-offs.
.- Adaptive Web Crawling for Threat Intelligence Using a Reinforcement Learning-Enhanced Large Language Model.
.- Enhancing Continuous Cognitive Diagnosis with Fuzzy Strategy-Based Hybrid Genetic Algorithm.
.- An Attention-Based Fuzzy Logic Method for Enhancing Node Aggregations in Graph Neural Network.
.- Defense Methodology in the Evaluation I.
.- Privacy-preserving recommendation algorithm based on Federated Learning.
.- YOLOv8-MING: Research on privacy fall detection algorithm based on improved YOLOv8.
.- NetTrans: Robust Encrypted Network Traffic Analysis with Multi-modal Pre-training.
.- Language Game for Evading Privacy Disclosure Risks via LLM-based Multi-agent Simulation.
.- A Password Generation Scheme Excluding Personal Privacy Information.