skip to content
Security with intelligent computing and big-data services Preview this item
ClosePreview this item
Checking...

Security with intelligent computing and big-data services

Author: Sheng-Lung Peng; Shiuh-Jeng Wang; Valentina Emilia Balas; Ming Zhao
Publisher: Cham, Switzerland : Springer, 2018.
Series: Advances in intelligent systems and computing, 733.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Sheng-Lung Peng; Shiuh-Jeng Wang; Valentina Emilia Balas; Ming Zhao
ISBN: 9783319764511 3319764519
OCLC Number: 1030303342
Notes: Includes author index.
Description: 1 online resource (xvi, 372 pages) : illustrations.
Contents: Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents --
Algorithms and Security Analysis. A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition; Abstract; 1. Introduction; 2. Data Clustering Based on Improved AFSA; 2.1. AFSA and Its Improvement 2.2. Clustering Analysis Based on the Improved AFSA; 3. Tensor Model and Recommendation Algorithm; 3.1. Tensor and Tensor Decomposition; 3.2. Tensor Decomposition with Dynamic Incremental Updating; 3.3. Tensor Modeling and Recommendation Algorithm; 4. Experiment Design and Data Analysis; 4.1. Testing Datasets; 4.2. Algorithm Evaluation Indices; 4.3. Experiment Results and Discussions; 5. Conclusion; Acknowledgements; References --
Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1. Introduction; 2. Representation Based Classification 3. The Classification of the Nearest Neighbor Representation in Feature Space; 4. Numerical Experiments; 4.1. Results of Experiments on Standard Two-Class Datasets; 4.2. Results of Experiment on Face Databases; 5. Conclusion; References --
A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM; Abstract; 1. Introduction; 2. The Proposed Algorithm of Aesthetic QR Code; 2.1. The Improved Salient Region Detection Algorithm; 2.2. The Generation of SPBVM; 2.3. The Synthetic Strategy; 3. Experimental Results; 3.1. Comparison Results with and Without Salient Region Detection 3.2. Correctness of QR Code Decoding; 3.3. Comparison of Different Aesthetic QR Code Algorithms; 4. Conclusion; Acknowledgments; References --
Compact Cat Swarm Optimization Algorithm; Abstract; 1. Introduction; 2. Related Work; 2.1. Virtual Population and Sampling Mechanism; 2.2. The Perturbation Vector Updating Rule; 2.3. Cat Swarm Optimization; 2.3.1. Seeking Mode; 2.3.2. Tracing Mode; 3. Compact Cat Swarm Optimization Algorithm; 3.1. Initialization and Perturbation Vector Updating Rules; 3.2. Seeking Mode; 3.3. Tracing Mode; 3.4. The Implementation Procedure and Details; 4. Experimental Results and Analyze 4.1. Memory Usage for All Compared Algorithms; 4.2. Comparisons for Convergence Result; 5. Conclusion; References --
Cryptanalysis and Detection Systems. Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns; Abstract; 1. Introduction; 2. Local Gabor Wavelets Patterns; 3. The Proposed Method; 3.1. Image Pre-processing; 3.2. Feature Extraction with LGWP; 3.3. Matching Block Pairs; 3.4. Post-processing; 4. Experimental Results; 5. Conclusions; References --
A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset; Abstract; 1. Introduction; 1.1. Cluster Analysis; 1.2. Feature Selection; 2. Methodology; 2.1. Dataset; 2.2. Discretization; 2.3. Cluster Analysis; 2.4. Correlation Based Feature Selection; 2.5. Machine Learning Algorithm; 3. Implementation and Results; 3.1. Evaluation Metrics; 3.2. Results with Cluster Analysis; 3.3. Results with Enhanced Anomaly Model; 3.4. Results with Proposed Method; 3.5. Additional Testing; 3.6. Compared with Other Work; 4. Conclusions; References Mitigating DoS Attacks in SDN Using Offloading Path Strategies --
An Extension of Attack Trees --
Shamir's Secret Sharing Scheme in Parallel --
Network Security and Applications. A Cognitive Global Clock Synchronization Protocol in WSNs --
A Generic Web Application Testing and Attack Data Generation Method --
The Study of Improvement and Risk Evaluation for Mobile Application Security Testing --
Application of Pattern for New CAPTCHA Generation Idea --
Digital Forensics and Mobile Systems. An Automatic Approach of Building Threat Patterns in Android --
Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics --
Ant-Based Botnet C&C Server Traceback --
Public Key Systems and Data Processing. T-Brain: A Collaboration Platform for Data Scientists --
Feature Extraction in Security Analytics: Reducing Data Complexity with Apache Spark --
Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids --
Verifying the Validity of Public Key Certificates Using Edge Computing --
Blockchain Applications in Technology. A Study on Blockchain-Based Circular Economy Credit Rating System --
Using Blockchain to Support Data and Service Management in IoV/IoT --
A Blockchain-Based Traceable Certification System.
Series Title: Advances in intelligent systems and computing, 733.
Responsibility: Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editors.

Abstract:

In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1030303342> # Security with intelligent computing and big-data services
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "1030303342" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/computers_intelligence_ai_&_semantics> ; # COMPUTERS / Intelligence (AI) & Semantics
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/artificial_intelligence_incl_robotics> ; # Artificial Intelligence (incl. Robotics)
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/security> ; # Security
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/engineering> ; # Engineering
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/computational_intelligence> ; # Computational Intelligence
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/big_data> ; # Big data
    schema:about <http://experiment.worldcat.org/entity/work/data/5145562261#Topic/artificial_intelligence> ; # Artificial intelligence
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/5145562261#Meeting/international_conference_on_security_with_intelligent_computing_and_big_data_services_1st_2017_taiwan> ; # International Conference on Security with Intelligent Computing and Big-data Services (1st : 2017 : Taiwan)
    schema:datePublished "2018" ;
    schema:description "Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents -- Algorithms and Security Analysis. A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition; Abstract; 1. Introduction; 2. Data Clustering Based on Improved AFSA; 2.1. AFSA and Its Improvement"@en ;
    schema:description "In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/5145562261#Person/peng_sheng_lung> ; # Sheng-Lung Peng
    schema:editor <http://experiment.worldcat.org/entity/work/data/5145562261#Person/zhao_ming> ; # Ming Zhao
    schema:editor <http://experiment.worldcat.org/entity/work/data/5145562261#Person/wang_shiuh_jeng> ; # Shiuh-Jeng Wang
    schema:editor <http://experiment.worldcat.org/entity/work/data/5145562261#Person/balas_valentina_emilia> ; # Valentina Emilia Balas
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5145562261> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/2194-5357> ; # Advances in intelligent systems and computing,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/5145562261#Series/advances_in_intelligent_systems_and_computing> ; # Advances in intelligent systems and computing ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/5145562261#CreativeWork/> ;
    schema:name "Security with intelligent computing and big-data services"@en ;
    schema:productID "1030303342" ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1743485> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-319-76450-4> ;
    schema:url <http://ra.ocls.ca/ra/login.aspx?inst=centennial&url=http://dx.doi.org/10.1007/978-3-319-76451-1> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=5344809> ;
    schema:url <https://ezproxy.aub.edu.lb/login?url=http://dx.doi.org/10.1007/978-3-319-76451-1> ;
    schema:url <http://ezaccess.libraries.psu.edu/login?url=http://dx.doi.org/10.1007/978-3-319-76451-1> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-319-76451-1> ;
    schema:url <http://libproxy.uwyo.edu/login/?url=http://doi.org/10.1007/978-3-319-76451-1> ;
    schema:url <http://uproxy.library.dc-uoit.ca/login?url=http://link.springer.com/10.1007/978-3-319-76451-1> ;
    schema:url <http://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319764511> ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-76451-1> ;
    schema:url <http://liverpool.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-76451-1> ;
    schema:url <https://link.springer.com/10.1007/978-3-319-76451-1> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-319-76451-1> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-76451-1> ;
    schema:workExample <http://worldcat.org/isbn/9783319764511> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB8M3770> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1030303342> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5145562261#Meeting/international_conference_on_security_with_intelligent_computing_and_big_data_services_1st_2017_taiwan> # International Conference on Security with Intelligent Computing and Big-data Services (1st : 2017 : Taiwan)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/5145562261#Place/taiwan> ; # Taiwan)
    schema:name "International Conference on Security with Intelligent Computing and Big-data Services (1st : 2017 : Taiwan)" ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Person/balas_valentina_emilia> # Valentina Emilia Balas
    a schema:Person ;
    schema:familyName "Balas" ;
    schema:givenName "Valentina Emilia" ;
    schema:name "Valentina Emilia Balas" ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Person/peng_sheng_lung> # Sheng-Lung Peng
    a schema:Person ;
    schema:familyName "Peng" ;
    schema:givenName "Sheng-Lung" ;
    schema:name "Sheng-Lung Peng" ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Person/wang_shiuh_jeng> # Shiuh-Jeng Wang
    a schema:Person ;
    schema:familyName "Wang" ;
    schema:givenName "Shiuh-Jeng" ;
    schema:name "Shiuh-Jeng Wang" ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Person/zhao_ming> # Ming Zhao
    a schema:Person ;
    schema:familyName "Zhao" ;
    schema:givenName "Ming" ;
    schema:name "Ming Zhao" ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Series/advances_in_intelligent_systems_and_computing> # Advances in intelligent systems and computing ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1030303342> ; # Security with intelligent computing and big-data services
    schema:name "Advances in intelligent systems and computing ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Topic/artificial_intelligence> # Artificial intelligence
    a schema:Intangible ;
    schema:name "Artificial intelligence"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Topic/artificial_intelligence_incl_robotics> # Artificial Intelligence (incl. Robotics)
    a schema:Intangible ;
    schema:name "Artificial Intelligence (incl. Robotics)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Topic/computational_intelligence> # Computational Intelligence
    a schema:Intangible ;
    schema:name "Computational Intelligence"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5145562261#Topic/computers_intelligence_ai_&_semantics> # COMPUTERS / Intelligence (AI) & Semantics
    a schema:Intangible ;
    schema:name "COMPUTERS / Intelligence (AI) & Semantics"@en ;
    .

<http://uproxy.library.dc-uoit.ca/login?url=http://link.springer.com/10.1007/978-3-319-76451-1>
    rdfs:comment "eBook available for UOIT via SpringerLink. Click link to access" ;
    .

<http://worldcat.org/entity/work/data/5145562261#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1030303342> ; # Security with intelligent computing and big-data services
    .

<http://worldcat.org/isbn/9783319764511>
    a schema:ProductModel ;
    schema:isbn "3319764519" ;
    schema:isbn "9783319764511" ;
    .

<http://worldcat.org/issn/2194-5357> # Advances in intelligent systems and computing,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1030303342> ; # Security with intelligent computing and big-data services
    schema:issn "2194-5357" ;
    schema:name "Advances in intelligent systems and computing," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.