Limit search to available items
Book Cover
E-book
Author International Conference on Cyber Security Intelligence and Analytics (2020 : Haikou Shi, China)

Title Cyber security intelligence and analytics : Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020). Volume 1 / Zheng Xu, Reza M. Parizi, Mohammad Hammoudeh, Octavio Loyola-González, editors
Published Cham : Springer, 2020

Copies

Description 1 online resource (840 pages)
Series Advances in Intelligent Systems and Computing ; v. 1146
Advances in intelligent systems and computing ; 1146.
Contents Intro -- Foreword -- Organization -- Steering Committee Chair -- General Chair -- Program Committee Chairs -- Publication Chairs -- Publicity Chairs -- Local Organizing Chairs -- Program Committee Members -- Contents -- Technical Tracks 1: Cyber Intelligence and Analytics from Different Layers of Network Space Solutions -- Computer Network Information Security Protection Strategy Based on Clustering Algorithms -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Troubles in Computer Network Information Security -- 2.2 Cluster Analysis Technology -- 2.3 Improved K-Means Clustering Algorithms
3 Experimental Simulation and Experimental Data -- 4 Experiments and Discussions -- 4.1 Experimental Process -- 4.2 Experimental Summary -- 5 Conclusion -- References -- Network Communication Security Program Design Based on Wireless Router -- Abstract -- 1 Introduction -- 2 TCM Module Platform Structure -- 2.1 Trusted Cryptographic Module -- 2.2 Trusted Cryptographic Service Module (TSM) -- 3 TCM Certification Based on 802.1X -- 4 System Test -- 4.1 Test Process -- 4.2 Test Result Analysis -- 5 Conclusion -- References
Network Intrusion Detection Model Based on Improved Convolutional Neural Network -- Abstract -- 1 Introduction -- 2 Convolution Neural Network Based on Genetic Algorithm -- 3 Intrusion Detection Experiment Based on Genetic Convolution Neural Network -- 3.1 Chromosome Coding and Fitness Function -- 3.2 Experimental Model Settings -- 3.3 Comparison Experiment Settings -- 3.4 Experimental Results and Analysis -- 4 Conclusion -- References -- Overall Layout and Security Measures of Campus Wireless Local Area Networks -- Abstract -- 1 Introduction -- 2 Methods and Techniques
2.1 Demand of Campus Network -- 2.2 Network Structure and Engineering Wiring (Fig. 1) -- 2.3 Business Deployment of the Campus Wireless Network (Fig. 2) -- 2.4 Management Mode of Campus Wireless Network (Fig. 3) -- 3 Security of Campus WLAN -- 3.1 Common Security Risks of Campus Wireless Network -- 3.1.1 DSSS Risks -- 3.1.2 WEP Security Vulnerability -- 3.1.3 Hardware Stolen -- 3.1.4 Fake Access Point -- 3.1.5 Other Hidden Dangers -- 3.2 Prevention Strategies -- 3.2.1 WLAN Authentication -- 3.2.2 Reasonable Installation of Wireless Network Equipment
3.2.3 Using Static IP Address and Intrusion Detection Tool -- 3.2.4 Set up Additional Third-Party Data Encryption Scheme -- 4 Summary and Prospect -- References -- Application of Computer Network Anomaly Recognition Based on Artificial Intelligence -- Abstract -- 1 Introduction -- 2 Current Status of Artificial Intelligence in Network Anomaly Diagnostic Applications -- 3 Network Management Based on Artificial Intelligence -- 4 Analysis of Basic Characteristics of Network Anomaly -- 4.1 Hierarchy -- 4.2 Transmissibility -- 4.3 Correlation -- 4.4 Randomness
Summary This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly those focusing on threat intelligence, analytics, and preventing cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods, and applications concerning all aspects of cyber security intelligence and analytics. CSIA 2020, which was held in Haikou, China on February 28-29, 2020, built on the previous conference in Wuhu, China (2019), and marks the series second successful installment
Notes 5 Application of Network Anomaly Recognition Method Based on Artificial Intelligence
Print version record
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Xu, Zheng
Parizi, Reza M
Hammoudeh, Mohammad
Loyola-González, Octavio
ISBN 9783030433062
3030433064
Other Titles CSIA 2020