Silicon Valley Cybersecurity Conference : : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers / / edited by Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson.

This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are...

Full description

Saved in:
Bibliographic Details
Superior document:Communications in Computer and Information Science, 1683
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer Nature Switzerland :, Imprint: Springer,, 2022.
Year of Publication:2022
Edition:1st ed. 2022.
Language:English
Series:Communications in Computer and Information Science, 1683
Physical Description:1 online resource (144 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993599245304498
ctrlnum (CKB)5710000000108219
(MiAaPQ)EBC7184188
(Au-PeEL)EBL7184188
(OCoLC)1369644381
(DE-He213)978-3-031-24049-2
(PPN)267808011
(EXLCZ)995710000000108219
collection bib_alma
record_format marc
spelling Bathen, Luis.
Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers / edited by Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson.
1st ed. 2022.
Cham : Springer Nature Switzerland : Imprint: Springer, 2022.
1 online resource (144 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Communications in Computer and Information Science, 1865-0937 ; 1683
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.
Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
Open Access
Data protection.
Image processing—Digital techniques.
Computer vision.
Artificial intelligence.
Computer engineering.
Computer networks.
Data and Information Security.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Artificial Intelligence.
Computer Engineering and Networks.
3-031-24048-0
Saldamli, Gokay.
Sun, Xiaoyan.
Austin, Thomas H.
Nelson, Alex J.
language English
format eBook
author Bathen, Luis.
spellingShingle Bathen, Luis.
Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /
Communications in Computer and Information Science,
Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
author_facet Bathen, Luis.
Saldamli, Gokay.
Sun, Xiaoyan.
Austin, Thomas H.
Nelson, Alex J.
author_variant l b lb
author2 Saldamli, Gokay.
Sun, Xiaoyan.
Austin, Thomas H.
Nelson, Alex J.
author2_variant g s gs
x s xs
t h a th tha
a j n aj ajn
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Bathen, Luis.
title Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /
title_sub Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /
title_full Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers / edited by Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson.
title_fullStr Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers / edited by Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson.
title_full_unstemmed Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers / edited by Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson.
title_auth Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /
title_new Silicon Valley Cybersecurity Conference :
title_sort silicon valley cybersecurity conference : third conference, svcc 2022, virtual event, august 17–19, 2022, revised selected papers /
series Communications in Computer and Information Science,
series2 Communications in Computer and Information Science,
publisher Springer Nature Switzerland : Imprint: Springer,
publishDate 2022
physical 1 online resource (144 pages)
edition 1st ed. 2022.
contents Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
isbn 3-031-24049-9
3-031-24048-0
issn 1865-0937 ;
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 1369644381
work_keys_str_mv AT bathenluis siliconvalleycybersecurityconferencethirdconferencesvcc2022virtualeventaugust17192022revisedselectedpapers
AT saldamligokay siliconvalleycybersecurityconferencethirdconferencesvcc2022virtualeventaugust17192022revisedselectedpapers
AT sunxiaoyan siliconvalleycybersecurityconferencethirdconferencesvcc2022virtualeventaugust17192022revisedselectedpapers
AT austinthomash siliconvalleycybersecurityconferencethirdconferencesvcc2022virtualeventaugust17192022revisedselectedpapers
AT nelsonalexj siliconvalleycybersecurityconferencethirdconferencesvcc2022virtualeventaugust17192022revisedselectedpapers
status_str n
ids_txt_mv (CKB)5710000000108219
(MiAaPQ)EBC7184188
(Au-PeEL)EBL7184188
(OCoLC)1369644381
(DE-He213)978-3-031-24049-2
(PPN)267808011
(EXLCZ)995710000000108219
carrierType_str_mv cr
hierarchy_parent_title Communications in Computer and Information Science, 1683
hierarchy_sequence 1683
is_hierarchy_title Silicon Valley Cybersecurity Conference : Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /
container_title Communications in Computer and Information Science, 1683
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1805515762775883776
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04049nam a22006615i 4500</leader><controlfield tag="001">993599245304498</controlfield><controlfield tag="005">20230118200625.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">230118s2022 sz | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-031-24049-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-24049-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5710000000108219</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7184188</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7184188</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1369644381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-3-031-24049-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)267808011</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995710000000108219</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">thema</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bathen, Luis.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Silicon Valley Cybersecurity Conference :</subfield><subfield code="b">Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers /</subfield><subfield code="c">edited by Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer Nature Switzerland :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (144 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science,</subfield><subfield code="x">1865-0937 ;</subfield><subfield code="v">1683</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Image processing—Digital techniques.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer vision.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer engineering.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Data and Information Security.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer Imaging, Vision, Pattern Recognition and Graphics.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer Engineering and Networks.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-031-24048-0</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saldamli, Gokay.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Xiaoyan.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Austin, Thomas H.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nelson, Alex J.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science,</subfield><subfield code="x">1865-0937 ;</subfield><subfield code="v">1683</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-07-25 02:32:27 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2023-02-11 21:29:23 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5345652080004498&amp;Force_direct=true</subfield><subfield code="Z">5345652080004498</subfield><subfield code="b">Available</subfield><subfield code="8">5345652080004498</subfield></datafield></record></collection>