- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26-28, 2024.
The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: -
Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario.
Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation.
Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.
Contents
.- Defense Methodology in the Evaluation .
.- An improved DPoS consensus mechanism in blockchain based on PDHLTS.
.- A Novel Network Security Situation Prediction Scheme for IIoT by Using LGF-Net.
.- Credit Card Fraud Detection with Imbalanced Small Data Using TabTransformer and Cost-Sensitive Learning.
.- Design and Cybersecurity for AIoT Systems.
.- A Research Survey on Network Intrusion Detection for AIoT.
.- A Retrieval-Augmented Framework Based on Knowledge Graphs and Vector Databases for Enhancing Large Language Model Performance.
.- Formal Modeling and Priority Handling Verification of Interrupt Injection in a Hypervisor.
.- Framework for Efficient Automated Alarm Analysis in Intelligent Connected Vehicles.
.- Metaverse and Simulation.
.- SG-LSBA: Semantic Latent Space Backdoor Attack on Stable Diffusion.
.- DLNN for E-commerce Recommendations: Time-Series Behavior Modeling.
.- An online predictive model for the caustic ratio in low-temperature alumina dissolution process.
.- Design and Implementation of Distributed Digital Twin Network based on Software-Defined Networks.
.- The Iterative Completion Mechanism for Entity Alignment Between Temporal Knowledge Graphs.
.- Secure loT and Blockchain -Enabled Solutions.
.- A Method for Internet Group User Behavior Simulation Based on Bidirectional Integrity Verification.
.- Mobile AI-Generated Content Data Sharing PrivacyPreserving Scheme for Logistics IoT in 6G Era-V3.
.- A traceable Threshold Signature Scheme in the Internet of Medical Things.
.- Real-Time Modeling and Simulation of Communication Environments Based on The Improved DGTD Method.
.- Research on One-Class Few-Shot Text Classification Method Based on Entailment.
.- CGP-Mamba: An Intrusion Detection Method Based on State Space Model.
.- A Malicious Encrypted Traffic Detection Method Based on Hybrid CNN and Swin Transformer.
.- Software and Protocols Security Analysis.
.- An efficient and secure Authentication Protocol for Distributed Internet of Vehicle in Smart City.
.- A Secure and Efficient Multi-factor User Authentication Protocol.
.- A Novel High-performance Random Number Generation Algorithm.
.- A Lightweight Authentication Protocol for Smart Grids.
.- Research on Intelligent Traffic Orchestration Methods Based on SaaSification of Security Software.
.- Test and Evaluation for Cybersecurity.
.- A Robust Anti-Tamper Database Watermarking Technique Independent of Primary Keys.
.- Knowledge-Guided Reasoning Chain of Pre-trained LLM in Industrial Domain.
.- A Technical Overview of Docker Container Security Threats.
.- Exploration Study about LLM with Proper Prompt in Automated Program Repair.
.- Information Security Test and Evaluation of Intelligent and Connected Vehicles Based on Attack Technique and Tactics.
.- Construction and application of attack tactics and tactics system for intelligent connected vehicles.