Security, Privacy, and Anonymity in Computation, Communication, and Storage
Springer International Publishing (Verlag)
978-3-030-05344-4 (ISBN)
Protecting Your Smartphone from Theft Using Accelerometer.- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis.- SDN-Based Secure VANETs Communication with Fog Computing.- Wearable Device Data for Criminal Investigation.- Authentication of Skyline Query over Road Networks.- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing.- Processing Analysis of Confidential Modes of Operation.- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm.- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems.- Indoor Interference Classification Based on WiFi Channel State Information.- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings.- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems.- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment.- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control.- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment.- Risk Identification-based Association Rule Mining for Supply Chain Big Data.- TrCMP: An App Usage Inference Method for Mobile Service Enhancement.- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication.- Cloud Enabled e-glossary System: A Smart Campus Perspective.- A Dynamic Integrity Transitivity Model for the Cloud.- Enhancing Dependability in Big Data Analytics Enterprise Pipelines.- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective.- CRAB: Blockchain Based Criminal Record Management System.- Secure Passive Keyless Entry and Start System Using Machine Learning.- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems.- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing.- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion.- BDCP A Framework for Big Data Copyright Protection Based on Digital Watermarking.- A Privacy-preserving Attribute-Based Access Control Scheme.- Checking an Authentication of Person Depends on RFID with Thermal Image.- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks.- An efficient provable multi-copy data possession scheme with data dynamics.- An Enhanced Key Management Scheme for LoRaWAN.- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics.- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems.- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies.- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree.- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison.- Research on Wireless Spectrum Sensing Technology Based on Machine Learning.- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning.- Malicious Domain Name Recognition Based on Deep Neural Networks.- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals.- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks.
| Erscheinungsdatum | 09.12.2018 |
|---|---|
| Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
| Zusatzinfo | XV, 534 p. 208 illus., 154 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 836 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
| Schlagworte | Applications • Artificial Intelligence • authentication • Cloud Computing • Computer Networks • Computer Science • conference proceedings • cryptography • Data communication systems • Data Mining • Data Security • Informatics • Internet • Internet of Things (IoT) • mobile computing • privacy • Quality of Service (QoS) • Radio • Research • sensor networks • Telecommunication networks • User Interfaces • wireless networks • wireless telecommunication systems • World Wide Web |
| ISBN-10 | 3-030-05344-X / 303005344X |
| ISBN-13 | 978-3-030-05344-4 / 9783030053444 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich