Cyber Security : : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.

Saved in:
Bibliographic Details
Superior document:Communications in Computer and Information Science Series ; v.1299
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer Singapore Pte. Limited,, 2021.
©2020.
Year of Publication:2021
Edition:1st ed.
Language:English
Series:Communications in Computer and Information Science Series
Online Access:
Physical Description:1 online resource (235 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006458353
ctrlnum (MiAaPQ)5006458353
(Au-PeEL)EBL6458353
(OCoLC)1232278670
collection bib_alma
record_format marc
spelling Lu, Wei.
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
1st ed.
Singapore : Springer Singapore Pte. Limited, 2021.
©2020.
1 online resource (235 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Communications in Computer and Information Science Series ; v.1299
Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work.
4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.
3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation.
2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.
A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Wen, Qiaoyan.
Zhang, Yuqing.
Lang, Bo.
Wen, Weiping.
Yan, Hanbing.
Li, Chao.
Ding, Li.
Li, Ruiguang.
Zhou, Yu.
Print version: Lu, Wei Cyber Security Singapore : Springer Singapore Pte. Limited,c2021 9789813349216
ProQuest (Firm)
Communications in Computer and Information Science Series
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6458353 Click to View
language English
format eBook
author Lu, Wei.
spellingShingle Lu, Wei.
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
Communications in Computer and Information Science Series ;
Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work.
4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.
3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation.
2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.
A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.
author_facet Lu, Wei.
Wen, Qiaoyan.
Zhang, Yuqing.
Lang, Bo.
Wen, Weiping.
Yan, Hanbing.
Li, Chao.
Ding, Li.
Li, Ruiguang.
Zhou, Yu.
author_variant w l wl
author2 Wen, Qiaoyan.
Zhang, Yuqing.
Lang, Bo.
Wen, Weiping.
Yan, Hanbing.
Li, Chao.
Ding, Li.
Li, Ruiguang.
Zhou, Yu.
author2_variant q w qw
y z yz
b l bl
w w ww
h y hy
c l cl
l d ld
r l rl
y z yz
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Lu, Wei.
title Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
title_sub 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
title_full Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
title_fullStr Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
title_full_unstemmed Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
title_auth Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
title_new Cyber Security :
title_sort cyber security : 17th china annual conference, cncert 2020, beijing, china, august 12, 2020, revised selected papers.
series Communications in Computer and Information Science Series ;
series2 Communications in Computer and Information Science Series ;
publisher Springer Singapore Pte. Limited,
publishDate 2021
physical 1 online resource (235 pages)
edition 1st ed.
contents Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work.
4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.
3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation.
2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.
A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.
isbn 9789813349223
9789813349216
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6458353
illustrated Not Illustrated
oclc_num 1232278670
work_keys_str_mv AT luwei cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT wenqiaoyan cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT zhangyuqing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT langbo cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT wenweiping cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT yanhanbing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT lichao cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT dingli cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT liruiguang cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT zhouyu cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
status_str n
ids_txt_mv (MiAaPQ)5006458353
(Au-PeEL)EBL6458353
(OCoLC)1232278670
carrierType_str_mv cr
hierarchy_parent_title Communications in Computer and Information Science Series ; v.1299
is_hierarchy_title Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.
container_title Communications in Computer and Information Science Series ; v.1299
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331058592612352
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11076nam a22005533i 4500</leader><controlfield tag="001">5006458353</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073839.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789813349223</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789813349216</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006458353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6458353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1232278670</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Wei.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security :</subfield><subfield code="b">17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore Pte. Limited,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (235 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science Series ;</subfield><subfield code="v">v.1299</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Qiaoyan.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lang, Bo.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ding, Li.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Ruiguang.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Yu.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Lu, Wei</subfield><subfield code="t">Cyber Security</subfield><subfield code="d">Singapore : Springer Singapore Pte. Limited,c2021</subfield><subfield code="z">9789813349216</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6458353</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>