Limit search to available items
Book Cover
E-book
Author SciSec (Conference) (2nd : 2019 : Nanjing Shi, China)

Title Science of cyber security : second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised selected papers / Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung (eds.)
Published Cham, Switzerland : Springer, 2019

Copies

Description 1 online resource (xiii, 382 pages) : illustrations (some color)
Series Lecture notes in computer science ; 11933
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11933.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Contents -- Artificial Intelligence for Cybersecurity -- Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data Analytics -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Problems and Definitions -- 3.1 The Concept of Tensor -- 3.2 Tensor Decomposition -- 3.3 Recommendation with HOSVD -- 3.4 Cross-Domain Recommendation -- 3.5 Transfer Learning -- 4 Cross-Domain with Tensor Decomposition -- 4.1 Extract Rating Mode -- 4.2 Transfer Rating Model -- 5 Experiments -- 5.1 Dataset -- 5.2 Experimental Results -- 6 Conclusions
4 Experiments and Results -- 4.1 Datasets and Evaluation Measures -- 4.2 Parameter Settings -- 4.3 Results and Analysis -- 5 Conclusion -- A Performance Comparison Between Deep Cascade Forest and Other Classifiers -- B Parameters of LSTM in our Experiment -- References -- Multiplex PageRank in Multilayer Networks Considering Shunt -- Abstract -- 1 Introduction -- 2 Discussion -- 3 Simulations -- 4 Conclusions -- References -- Machine Learning for Cybersecurity -- LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs -- 1 Introduction -- 2 Related Work
2.1 Supervised Anomaly Detection -- 2.2 Semi-supervised Anomaly Detection -- 2.3 Unsupervised Anomaly Detection -- 3 Method -- 3.1 Log Parser -- 3.2 Adversarial Learning -- 3.3 Anomaly Detection -- 4 Experiment -- 4.1 Experimental Setup -- 4.2 Result and Discussion -- 5 Conclusion -- References -- Security Comparison of Machine Learning Models Facing Different Attack Targets -- 1 Introduction -- 2 Related Work -- 3 Preliminary -- 3.1 Relevant Machine Learning Models -- 3.2 Adversarial Attack -- 3.3 Security Evaluation -- 4 Attack on Test Data -- 4.1 Background and Settings
4.2 Experiments and Results -- 5 Attack on Train Data -- 5.1 Background and Settings -- 5.2 Experiments and Results -- 6 Attack on Model Parameters -- 6.1 With Complete Authority -- 6.2 With Part of Authority and Perfect Knowledge -- 6.3 With Part of Authority and Limited Knowledge -- 7 Conclusion -- References -- Adversarial Training Based Feature Selection -- Abstract -- 1 Introduction -- 2 Framework of Adversarial Training-Based Feature Selection -- 2.1 Objective Functions in Adversarial Training -- 2.2 Optimization Method -- 2.3 Adversarial Training Based Feature Selection
Summary This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019. The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 62 submissions. These papers cover the following subjects: Artificial Intelligence for Cybersecurity, Machine Learning for Cybersecurity, and Mechanisms for Solving Actual Cybersecurity Problems (e.g., Blockchain, Attack and Defense; Encryptions with Cybersecurity Applications)
Notes Includes author index
Online resource; title from PDF title page (SpringerLink, viewed December 24, 2019)
Subject Computer security -- Congresses
Computer security
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Liu, Feng, editor
Xu, Jia (Professor of Computer Science), editor.
Xu, Shouhuai, editor.
Yung, Moti, editor.
ISBN 9783030346379
3030346374
3030346366
9783030346362
9783030346386
3030346382
Other Titles SciSec 2019