Cyberspace Simulation and Evaluation : Third International Conference, CSE 2024, Shenzhen, China, November 26-28, 2024, Proceedings, Part III (Communications in Computer and Information Science)

個数:

Cyberspace Simulation and Evaluation : Third International Conference, CSE 2024, Shenzhen, China, November 26-28, 2024, Proceedings, Part III (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 449 p.
  • 言語 ENG
  • 商品コード 9789819645084

Full Description

This three volume set, CCIS 2420 - 2422 , constitutes the proceedings of the Third International Conference on Cyberspace Simulation and Evaluation, CSE 2024, held in Shenzhen, China, during November 26-28, 2024.

The 90 full papers included in this book were carefully reviewed and selected from 164 submissions. These papers are organized under topical sections as follows: - 

Part I : Simulation Theory and Methodology; Simulation for CI scenario; Defense Methodology in the Evaluation; and Simulation for IoT scenario.

Part II : Attack Methodology in the Evaluation; Other Simulation and Evaluation methods; Evaluation Theory and Methodology; and Defense Methodology in the Evaluation.

Part III: Defense Methodology in the Evaluation; Design and Cybersecurity for AIoT Systems; Metaverse and Simulation; Secure loT and Blockchain -Enabled Solutions; Software and Protocols Security Analysis; and Test and Evaluation for Cybersecurity.

Contents

.- Defense Methodology in the Evaluation .
.- An improved DPoS consensus mechanism in blockchain based on PDHLTS.
.- A Novel Network Security Situation Prediction Scheme for  IIoT by Using LGF-Net.
.- Credit Card Fraud Detection with Imbalanced Small Data Using TabTransformer and Cost-Sensitive Learning.
.- Design and Cybersecurity for AIoT Systems.
.- A Research Survey on Network Intrusion Detection for AIoT.
.- A Retrieval-Augmented Framework Based on Knowledge Graphs and Vector Databases for Enhancing Large Language Model Performance.
.- Formal Modeling and Priority Handling Verification of Interrupt Injection in a Hypervisor.
.- Framework for Efficient Automated Alarm Analysis in Intelligent Connected Vehicles.
.- Metaverse and Simulation.
.- SG-LSBA: Semantic Latent Space Backdoor Attack on Stable Diffusion.
.- DLNN for E-commerce Recommendations: Time-Series Behavior Modeling.
.- An online predictive model for the caustic ratio in low-temperature alumina dissolution process.
.- Design and Implementation of Distributed Digital Twin Network based on Software-Defined Networks.
.- The Iterative Completion Mechanism for Entity Alignment Between Temporal Knowledge Graphs.
.- Secure loT and Blockchain -Enabled Solutions.
.- A Method for Internet Group User Behavior Simulation Based on Bidirectional Integrity Verification.
.- Mobile AI-Generated Content Data Sharing PrivacyPreserving Scheme for Logistics IoT in 6G Era-V3.
.- A traceable Threshold Signature Scheme in the Internet of Medical Things.
.- Real-Time Modeling and Simulation of Communication Environments Based on The Improved DGTD Method.
.- Research on One-Class Few-Shot Text Classification Method Based on Entailment.
.- CGP-Mamba: An Intrusion Detection Method Based on State Space Model.
.-  A Malicious Encrypted Traffic Detection Method Based on Hybrid CNN and Swin Transformer.
.- Software and Protocols Security Analysis.
.- An efficient and secure Authentication Protocol for Distributed Internet of Vehicle in Smart City.
.- A Secure and Efficient Multi-factor User Authentication Protocol.
.- A Novel High-performance Random Number Generation Algorithm.
.- A Lightweight Authentication Protocol for Smart Grids.
.- Research on Intelligent Traffic Orchestration Methods Based on SaaSification of Security Software.
.- Test and Evaluation for Cybersecurity.
.- A Robust Anti-Tamper Database Watermarking Technique Independent of Primary Keys.
.- Knowledge-Guided Reasoning Chain of Pre-trained LLM in Industrial Domain.
.- A Technical Overview of Docker Container Security Threats.
.- Exploration Study about LLM with Proper Prompt in Automated Program Repair.
.- Information Security Test and Evaluation of Intelligent and Connected Vehicles Based on Attack Technique and Tactics.
.- Construction and application of attack tactics and tactics system for intelligent connected vehicles.

最近チェックした商品