Cyberspace Simulation and Evaluation : Third International Conference, CSE 2024, Shenzhen, China, November 26-28, 2024, Proceedings, Part II (Communications in Computer and Information Science)

個数:

Cyberspace Simulation and Evaluation : Third International Conference, CSE 2024, Shenzhen, China, November 26-28, 2024, Proceedings, Part II (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 485 p.
  • 言語 ENG
  • 商品コード 9789819645053

Full Description

This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26-28, 2024.

The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: - 

Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario.

Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation.

Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.

Contents

.- Attack Methodology in the Evaluation .

.- Directed Symbolic Execution Tool Based on Clang Static Analyzer: Efficient and Accurate Verification of Static Analysis Results.

.- A Survey on Covert Network Attack.

.- Review of Path Planning and Decision-Making in Automated Penetration Testing.

.- Dynamic Analysis of Attack Paths Based on Bayesian Attack Graph.

.- A Self-evolution Attack Tree Method Based on the MDATA Model for Attack Tactics Recommendation.

.- WFSCK: An Intelligent File System Check Recovery and Task Management Framework.

.- Power Analysis Attack Based on Chosen-plaintext.

.- Modeling and Assessing The Attack Behaviour of Weak Passwords Based on Attack Graph.

.- Other Simulation and Evaluation methods.

.- A Multispectral Pedestrian Detection Method Based on Feature Fusion.

.- Localization of small targets in smart grain warehouse based on VAE-LSTM.

.- Hybrid Indexing for Label-Constrained Reachability on Temporal Property Graphs.

.- Reverse Method for DGA Based on Generative BiLSTM  Model.

.- Enhancing Cross-Domain Data Analytics through MultiSource Transfer Learning.

.- A novel image encryption algorithm based on chaotic   tent mapping.

.- A Comparative Testing of Object Detection Model based on Adversarial Examples.

.- Exploring Occupational Gender Bias in Large Language Models of High-Resource Language.

.- FEDGA:FL with Dynamic Gradient and Group Normalization.

.- Evaluation Theory and Methodology.

.- Review of Fuzz Testing Techniques for Database Management Systems.

.- Correlation Analysis of Tor Traffic Based on RAINBOW Scheme in Cloud Computing Environment.

.- A hybrid framework for effective and efficient machine unlearning.

.- Enhancing Mixnets Security: Detecting and Isolating Malicious Nodes While Forcing Adversaries into Strategic Trade-offs.

.- Adaptive Web Crawling for Threat Intelligence Using a  Reinforcement Learning-Enhanced Large Language  Model.

.- Enhancing Continuous Cognitive Diagnosis with Fuzzy Strategy-Based Hybrid Genetic Algorithm.

.- An Attention-Based Fuzzy Logic Method for Enhancing Node Aggregations in Graph Neural Network.

.- Defense Methodology in the Evaluation I.

.- Privacy-preserving recommendation algorithm based on Federated Learning.

.- YOLOv8-MING: Research on privacy fall detection algorithm based on improved YOLOv8.

.- NetTrans: Robust Encrypted Network Traffic Analysis with Multi-modal Pre-training.

.- Language Game for Evading Privacy Disclosure Risks via LLM-based Multi-agent Simulation.

.- A Password Generation Scheme Excluding Personal Privacy Information.

最近チェックした商品