Free shipping on orders over $99
Artificial Intelligence and Security

Artificial Intelligence and Security

5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV

by Xingming SunZhaoqing Pan and Elisa Bertino
Paperback
Publication Date: 24/08/2019

Share This Book:

  $84.99
or 4 easy payments of $21.25 with
afterpay
Encryption and Cybersecurity.- A Gray-Box Vulnerability Discovery Model based on Path Coverage.- Quantum Network Coding Based on Entanglement Distribution.- Moving Target Defense in Preventing SQL Injection.- Design and Security Analysis of Certificateless Aggregate Signature Scheme.- SuperEye: a Distributed Port Scanning System.- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data.- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis.- Short Text Topic Recognition and Optimization Method for University Online Community.- A Survey on Network Traffic Identification.- A Survey of Network Security Situational Awareness Technology.- Multi-function Quantum Cryptography Protocol Based On Bell State.- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis.- A Weight-Based Channel Estimation Implementation Algorithm.- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function.- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme.- Robust Analysis of Grid System Based on Complex Network Attack Mode.- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE.- Research on SQL Injection and Defense Technology.- A Review of the Factorization Problem of Large Integers.- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks.- A Survey of Privacy-Preserving Techniques for Blockchain.- A Survey of Software Reverse Engineering Applications.- A Fast IP Matching Algorithm under Large Traffic.- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers.- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric.- Research on Content Extraction of Rich Text Web Pages.- Network Protocol Analysis base on WeChat PC Version.- Bitcoin Network Size Estimation Based on Coupon Collection Model.- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques.- A Distributed Cryptanalysis Framework based on Mobile Phones.- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier.- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network.- Fast Failover for Link Failures in Software Defined Networks.- Steady-state Topology Discovery of Target Networks based on Statistics Method.- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels.- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn.- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory.- Webshell Detection Model based on Deep Learning.- A Security-Sensitive Function Mining Framework for Source Code.- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net.- Trusted Component Decomposition Based on OR-transition Colored Petri Net.- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range.- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning.- Identify Influentials Based on User behavior Across Different Topics.- Taylor Series Localization Algorithm Based on Semi-definite Programming.- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene.- An evolving network model based on a triangular connecting mechanism for the Internet topology.- A new quantum private query protocol with better performance in resisting joint-measurement attack.- PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid.- Blockchain Private Key Storage Algorithm Based on Image Information Hiding.- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network.- Quantum algorithm for support vector machine with exponentially improved d
ISBN:
9783030242671
9783030242671
Category:
Computer security
Format:
Paperback
Publication Date:
24-08-2019
Language:
English
Publisher:
Springer International Publishing AG
Country of origin:
Switzerland
Dimensions (mm):
235x155mm
Weight:
1.01kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Artificial Intelligence and Security.