Security with intelligent computing and big-data services /
نام عام مواد
[Book]
نام نخستين پديدآور
Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editors.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Cham, Switzerland :
نام ناشر، پخش کننده و غيره
Springer,
تاریخ نشرو بخش و غیره
2018.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (xvi, 372 pages) :
ساير جزييات
illustrations
فروست
عنوان فروست
Advances in intelligent systems and computing,
مشخصه جلد
volume 733
شاپا ي ISSN فروست
2194-5357 ;
يادداشت کلی
متن يادداشت
Includes author index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents -- Algorithms and Security Analysis. A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition; Abstract; 1. Introduction; 2. Data Clustering Based on Improved AFSA; 2.1. AFSA and Its Improvement
متن يادداشت
2.2. Clustering Analysis Based on the Improved AFSA; 3. Tensor Model and Recommendation Algorithm; 3.1. Tensor and Tensor Decomposition; 3.2. Tensor Decomposition with Dynamic Incremental Updating; 3.3. Tensor Modeling and Recommendation Algorithm; 4. Experiment Design and Data Analysis; 4.1. Testing Datasets; 4.2. Algorithm Evaluation Indices; 4.3. Experiment Results and Discussions; 5. Conclusion; Acknowledgements; References -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1. Introduction; 2. Representation Based Classification
متن يادداشت
3. The Classification of the Nearest Neighbor Representation in Feature Space; 4. Numerical Experiments; 4.1. Results of Experiments on Standard Two-Class Datasets; 4.2. Results of Experiment on Face Databases; 5. Conclusion; References -- A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM; Abstract; 1. Introduction; 2. The Proposed Algorithm of Aesthetic QR Code; 2.1. The Improved Salient Region Detection Algorithm; 2.2. The Generation of SPBVM; 2.3. The Synthetic Strategy; 3. Experimental Results; 3.1. Comparison Results with and Without Salient Region Detection
متن يادداشت
3.2. Correctness of QR Code Decoding; 3.3. Comparison of Different Aesthetic QR Code Algorithms; 4. Conclusion; Acknowledgments; References -- Compact Cat Swarm Optimization Algorithm; Abstract; 1. Introduction; 2. Related Work; 2.1. Virtual Population and Sampling Mechanism; 2.2. The Perturbation Vector Updating Rule; 2.3. Cat Swarm Optimization; 2.3.1. Seeking Mode; 2.3.2. Tracing Mode; 3. Compact Cat Swarm Optimization Algorithm; 3.1. Initialization and Perturbation Vector Updating Rules; 3.2. Seeking Mode; 3.3. Tracing Mode; 3.4. The Implementation Procedure and Details; 4. Experimental Results and Analyze
متن يادداشت
4.1. Memory Usage for All Compared Algorithms; 4.2. Comparisons for Convergence Result; 5. Conclusion; References -- Cryptanalysis and Detection Systems. Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns; Abstract; 1. Introduction; 2. Local Gabor Wavelets Patterns; 3. The Proposed Method; 3.1. Image Pre-processing; 3.2. Feature Extraction with LGWP; 3.3. Matching Block Pairs; 3.4. Post-processing; 4. Experimental Results; 5. Conclusions; References -- A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset; Abstract; 1. Introduction; 1.1. Cluster Analysis; 1.2. Feature Selection; 2. Methodology; 2.1. Dataset; 2.2. Discretization; 2.3. Cluster Analysis; 2.4. Correlation Based Feature Selection; 2.5. Machine Learning Algorithm; 3. Implementation and Results; 3.1. Evaluation Metrics; 3.2. Results with Cluster Analysis; 3.3. Results with Enhanced Anomaly Model; 3.4. Results with Proposed Method; 3.5. Additional Testing; 3.6. Compared with Other Work; 4. Conclusions; References
متن يادداشت
Mitigating DoS Attacks in SDN Using Offloading Path Strategies -- An Extension of Attack Trees -- Shamir's Secret Sharing Scheme in Parallel -- Network Security and Applications. A Cognitive Global Clock Synchronization Protocol in WSNs -- A Generic Web Application Testing and Attack Data Generation Method -- The Study of Improvement and Risk Evaluation for Mobile Application Security Testing -- Application of Pattern for New CAPTCHA Generation Idea -- Digital Forensics and Mobile Systems. An Automatic Approach of Building Threat Patterns in Android -- Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics -- Ant-Based Botnet C & C Server Traceback -- Public Key Systems and Data Processing. T-Brain: A Collaboration Platform for Data Scientists -- Feature Extraction in Security Analytics: Reducing Data Complexity with Apache Spark -- Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids -- Verifying the Validity of Public Key Certificates Using Edge Computing -- Blockchain Applications in Technology. A Study on Blockchain-Based Circular Economy Credit Rating System -- Using Blockchain to Support Data and Service Management in IoV/IoT -- A Blockchain-Based Traceable Certification System.
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9783319764511
ویراست دیگر از اثر در قالب دیگر رسانه
شماره استاندارد بين المللي کتاب و موسيقي
9783319764504
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Artificial intelligence, Congresses.
موضوع مستند نشده
Big data, Congresses.
موضوع مستند نشده
Computer security, Congresses.
موضوع مستند نشده
Artificial intelligence.
موضوع مستند نشده
Artificial intelligence.
موضوع مستند نشده
Big data.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
COMPUTERS-- Intelligence (AI) & Semantics.
مقوله موضوعی
موضوع مستند نشده
COM-- 004000
موضوع مستند نشده
UYQ
رده بندی ديویی
شماره
005
.
8
ويراست
23
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نام شخص - (مسئولیت معنوی برابر )
مستند نام اشخاص تاييد نشده
Balas, Valentina Emilia
مستند نام اشخاص تاييد نشده
Peng, Sheng-Lung
مستند نام اشخاص تاييد نشده
Wang, Shiuh-Jeng
مستند نام اشخاص تاييد نشده
Zhao, Ming
نام تنالگان به منزله سر شناسه - (مسئولیت معنوی درجه اول )
مستند نام تنالگان تاييد نشده
International Conference on Security with Intelligent Computing and Big-data Services(1st :2017 :, Taiwan)