↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Prototype-Based Malware Traffic Classification with Novelty Detection
  3. Altmetric Badge
    Chapter 2 Evading API Call Sequence Based Malware Classifiers
  4. Altmetric Badge
    Chapter 3 UBER: Combating Sandbox Evasion via User Behavior Emulators
  5. Altmetric Badge
    Chapter 4 AADS : A Noise-Robust Anomaly Detection Framework for Industrial Control Systems
  6. Altmetric Badge
    Chapter 5 Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data
  7. Altmetric Badge
    Chapter 6 Cloning Vulnerability Detection in Driver Layer of IoT Devices
  8. Altmetric Badge
    Chapter 7 Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System
  9. Altmetric Badge
    Chapter 8 Road Context-Aware Intrusion Detection System for Autonomous Cars
  10. Altmetric Badge
    Chapter 9 Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC
  11. Altmetric Badge
    Chapter 10 HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks
  12. Altmetric Badge
    Chapter 11 CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding
  13. Altmetric Badge
    Chapter 12 VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode
  14. Altmetric Badge
    Chapter 13 Deep Learning-Based Vulnerable Function Detection: A Benchmark
  15. Altmetric Badge
    Chapter 14 Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging
  16. Altmetric Badge
    Chapter 15 SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks
  17. Altmetric Badge
    Chapter 16 CDAE: Towards Empowering Denoising in Side-Channel Analysis
  18. Altmetric Badge
    Chapter 17 Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies
  19. Altmetric Badge
    Chapter 18 Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems
  20. Altmetric Badge
    Chapter 19 Provably Secure Group Authentication in the Asynchronous Communication Model
  21. Altmetric Badge
    Chapter 20 AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities
  22. Altmetric Badge
    Chapter 21 A Multi-Group Signature Scheme from Lattices
  23. Altmetric Badge
    Chapter 22 Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption
  24. Altmetric Badge
    Chapter 23 Using Equivalent Class to Solve Interval Discrete Logarithm Problem
  25. Altmetric Badge
    Chapter 24 Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)
  26. Altmetric Badge
    Chapter 25 Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features
  27. Altmetric Badge
    Chapter 26 Improved Differential Attacks on GIFT-64
  28. Altmetric Badge
    Chapter 27 Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs
  29. Altmetric Badge
    Chapter 28 Towards Blockchain-Enabled Searchable Encryption
  30. Altmetric Badge
    Chapter 29 DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN
  31. Altmetric Badge
    Chapter 30 Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays
  32. Altmetric Badge
    Chapter 31 Context-Aware IPv6 Address Hopping
  33. Altmetric Badge
    Chapter 32 Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN
  34. Altmetric Badge
    Chapter 33 FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels
  35. Altmetric Badge
    Chapter 34 CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework
  36. Altmetric Badge
    Chapter 35 An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II
  37. Altmetric Badge
    Chapter 36 Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks
  38. Altmetric Badge
    Chapter 37 Capturing the Persistence of Facial Expression Features for Deepfake Video Detection
  39. Altmetric Badge
    Chapter 38 Differentially Private Frequent Itemset Mining Against Incremental Updates
  40. Altmetric Badge
    Chapter 39 Differentially Private Reinforcement Learning
  41. Altmetric Badge
    Chapter 40 Privacy-Preserving Distributed Machine Learning Based on Secret Sharing
  42. Altmetric Badge
    Chapter 41 Privacy-Preserving Decentralised Singular Value Decomposition
  43. Altmetric Badge
    Chapter 42 WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning
  44. Altmetric Badge
    Chapter 43 A Character-Level BiGRU-Attention for Phishing Classification
  45. Altmetric Badge
    Chapter 44 Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities
  46. Altmetric Badge
    Chapter 45 Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals
  47. Altmetric Badge
    Chapter 46 Convolutional Neural Network Based Side-Channel Attacks with Customized Filters
  48. Altmetric Badge
    Chapter 47 DLchain: A Covert Channel over Blockchain Based on Dynamic Labels
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 tweeter

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information and Communications Security
Published by
Springer International Publishing, May 2020
DOI 10.1007/978-3-030-41579-2
ISBNs
978-3-03-041578-5, 978-3-03-041579-2
Editors

Zhou, Jianying, Luo, Xiapu, Shen, Qingni, Xu, Zhen

Twitter Demographics

The data shown below were collected from the profile of 1 tweeter who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 75%
Student > Postgraduate 1 25%
Readers by discipline Count As %
Computer Science 3 75%
Engineering 1 25%