logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV (Paperback, 2019)

Elisa Bertino, Xingming Sun, Zhaoqing Pan (엮은이)
Springer
99,980원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
81,980원 -18% 0원
4,100원
77,880원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV
eBook 미리보기

책 정보

· 제목 : Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV (Paperback, 2019) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783030242671
· 쪽수 : 651쪽
· 출판일 : 2019-07-11

목차

Encryption and Cybersecurity.- A Gray-Box Vulnerability Discovery Model based on Path Coverage.- Quantum Network Coding Based on Entanglement Distribution.- Moving Target Defense in Preventing SQL Injection.- Design and Security Analysis of Certificateless Aggregate Signature Scheme.- SuperEye: a Distributed Port Scanning System.- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data.- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis.- Short Text Topic Recognition and Optimization Method for University Online Community.- A Survey on Network Traffic Identification.- A Survey of Network Security Situational Awareness Technology.- Multi-function Quantum Cryptography Protocol Based On Bell State.- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis.- A Weight-Based Channel Estimation Implementation Algorithm.- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function.- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme.- Robust Analysis of Grid System Based on Complex Network Attack Mode.- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE.- Research on SQL Injection and Defense Technology.- A Review of the Factorization Problem of Large Integers.- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks.- A Survey of Privacy-Preserving Techniques for Blockchain.- A Survey of Software Reverse Engineering Applications.- A Fast IP Matching Algorithm under Large Traffic.- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers.- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric.- Research on Content Extraction of Rich Text Web Pages.- Network Protocol Analysis base on WeChat PC Version.- Bitcoin Network Size Estimation Based on Coupon Collection Model.- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques.- A Distributed Cryptanalysis Framework based on Mobile Phones.- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier.- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network.- Fast Failover for Link Failures in Software Defined Networks.- Steady-state Topology Discovery of Target Networks based on Statistics Method.- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels.- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn.- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory.- Webshell Detection Model based on Deep Learning.- A Security-Sensitive Function Mining Framework for Source Code.- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net.- Trusted Component Decomposition Based on OR-transition Colored Petri Net.- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range.- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning.- Identify Influentials Based on User behavior Across Different Topics.- Taylor Series Localization Algorithm Based on Semi-definite Programming.- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene.- An evolving network model based on a triangular connecting mechanism for the Internet topology.- A new quantum private query protocol with better performance in resisting joint-measurement attack.- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid.- Blockchain Private Key Storage Algorithm Based on Image Information Hiding.- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network.- Quantum algorithm for support vector machine with exponentially improved dependence on precision.- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid.- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain.- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks.- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis.- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책