Keywords:
Computer security-Congresses.
;
Computational intelligence.
;
Educational technology-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (279 pages)
Edition:
1st ed.
ISBN:
9783031184093
Series Statement:
Lecture Notes in Networks and Systems Series ; v.532
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=7131998
DDC:
006.3
Language:
English
Note:
Intro -- Preface -- Organization -- CISIS 2021 -- General Chair -- Program Committee Chair -- Program Committee -- CISIS 2022: Special Sessions -- Cybersecurity in Future Connected Societies -- Program Committee -- Cybersecurity and Trusted Supply Chains of ICT -- Program Committee -- Intelligent Solutions for Cybersecurity -- Program Committee -- CISIS 2022 Organizing Committee Chairs -- CISIS 2022 Organizing Committee -- ICEUTE 2022 -- Organization -- General Chair -- Program Committee Chair -- Program Committee -- ICEUTE 2022 Organizing Committee Chairs -- ICEUTE 2022 Organizing Committee -- Contents -- CISIS Applications -- Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Experiment Design -- 3.3 Machine Learning Algorithms -- 4 Experimental Results -- 5 Conclusion -- References -- Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems -- 1 Introduction -- 2 Related Work -- 3 FedGA-ICPS Framework -- 3.1 Industrial CPS -- 3.2 Learning -- 3.3 Election -- 3.4 Aggregation -- 3.5 Broadcasting -- 4 Experimental Results -- 5 Conclusion -- References -- Hand SOS Gesture Detection by Computer Vision -- 1 Introduction -- 2 Problem Description -- 3 Model Architecture -- 4 Model Evaluation -- 5 Conclusions -- References -- Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection -- 1 Introduction -- 2 Security Risks in Smart Metering Networks -- 3 The Methodology for the SMCN Anomaly/Attack Detection -- 3.1 Detection and Elimination of Outliers, Based on the Isolation Forest Algorithm -- 3.2 Calculation of Multi-step Prediction for Anomaly Detection with 1D CNN -- 4 Experimental Results -- 5 Conclusions -- References.
,
An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids -- 1 Introduction -- 2 Case of Study -- 2.1 Level Control Plant -- 2.2 System Integration and Its Control Implementation -- 2.3 Dataset -- 3 Methodological Approach -- 3.1 On-Line Identification Stage. Recursive Least Square -- 3.2 Fault Detection Stage -- 4 Experiments and Results -- 5 Conclusions and Future Work -- References -- Powerful Biogeography-Based Optimization Algorithm with Local Search Mechanism for Job Shop Scheduling Problem with Additional Constraints -- 1 Introduction -- 2 Job Shop Scheduling Problem with Time Lags and Single Transport Robot: JSPTL-STR -- 3 Powerful Biogeography-Based Optimization with Local Search Mechanism for Job Shop Scheduling Problem with Time Lags and Single Transport Robot -- 3.1 Habitat Representation -- 3.2 Initialization of Population -- 3.3 Migration Operator -- 3.4 Mutation Operator -- 4 Experimental Results -- 5 Conclusion -- References -- Dimensionality-Reduction Methods for the Analysis of Web Traffic -- 1 Introduction and Previous Work -- 2 Applied Methods -- 2.1 Laplacian Eigenmaps -- 2.2 Isomap -- 2.3 t-Distributed Stochastic Neighbor Embedding -- 2.4 Beta Hebbian Learning -- 3 Dataset -- 4 Results -- 4.1 Dataset 1 -- 4.2 Dataset 2 -- 5 Conclusions and Future Work -- References -- Special Session on Cybersecurity in Future Connected Societies -- About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call -- 1 Introduction -- 2 Theoretical Background -- 2.1 Security Definitions -- 2.2 Code-Based Encryption -- 3 Modern FO-Like Transformations -- 3.1 Encrypt-with-Hash -- 3.2 Implicit/Explicit Rejection -- 3.3 Definition of the Shared Secret -- 3.4 Additional Hash -- 4 FO Transformation Application in Code-Based Algorithms -- 4.1 Classic McEliece -- 4.2 BIKE -- 4.3 HQC.
,
5 Conclusions -- References -- Analysis of Secret Key Agreement Protocol for Massive MIMO Systems -- 1 Introduction -- 2 System Model -- 3 Proposed SKA -- 3.1 Precoding Design -- 3.2 Protocol Design -- 4 Simulation Results -- 4.1 Secrecy Capacity -- 4.2 SKA Complexity -- 5 Conclusion -- References -- Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices -- 1 Introduction -- 2 SNOW 3G Description -- 3 Equivalent Binary Model of LFSR in GF(2n) -- 4 Efficient Implementation -- 5 Performance Evaluation -- 6 Conclusions -- References -- State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility -- 1 Introduction -- 2 CCAM Ecosystem -- 3 Challenges in CCAM Solutions -- 4 CCAM Cybersecurity -- 4.1 Threats and Attack Analysis -- 4.2 Cyberattack Target Examples -- 4.3 Cybersecurity Methodologies in the CCAM Development Process -- 5 Cryptography -- 5.1 Post-quantum Cryptography -- 5.2 Lightweight Cryptography -- 6 Conclusions -- References -- Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids -- 1 Introduction -- 2 Smart Grids and Advanced Metering Infrastructures -- 3 Security in Advanced Metering Infrastructures -- 4 Cryptographic Protocols to Secure Advanced Metering Infrastructures -- 5 Conclusions -- References -- Special Session on Cybersecurity and Trusted Supply Chains of ICT -- Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication -- 1 Introduction -- 2 Related Work -- 3 Communication Principles in Microservices-Based Architectures -- 3.1 Communication Between Microservices -- 3.2 Security -- 3.3 Communication Stages -- 4 Asynchronous Service State Handling -- 5 Orchestrator Architecture -- 5.1 Microservices Lifecycle in BIECO -- 6 Advantages and Disadvantages of This Approach -- 7 Conclusions -- References.
,
A Comparative Study of Machine Learning Algorithms for the Detection of Vulnerable Python Libraries -- 1 Introduction -- 2 Approach -- 2.1 Data Collection -- 2.2 Feature Extraction -- 2.3 Modelling -- 3 Implementation and Evaluation -- 3.1 Evaluation -- 4 Conclusions -- References -- Evaluation of the Reliability Index of IP Addresses in Reputation Lists -- 1 Introduction -- 2 Materials and Methods -- 2.1 Reputation Lists -- 2.2 IDS - Intrusion Detection System -- 2.3 Implementation -- 2.4 Metrics -- 3 Results -- 4 Conclusions and Further Work -- References -- Forecasting the Number of Bugs and Vulnerabilities in Software Components Using Neural Network Models -- 1 Introduction -- 2 Literature Review -- 3 Neural Network Models -- 4 Data Collection -- 5 Experimental Results -- 6 Conclusions -- References -- Special Session on Intelligent Solutions for Cybersecurity Systems -- Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery -- 1 Introduction -- 2 Markov Decision Process -- 2.1 Preliminaries -- 2.2 MDP for Finding Information in Complex Networks -- 3 Performance Evaluation -- 3.1 Case Study Description -- 3.2 Results -- 4 Conclusion -- References -- Obfuscating LLVM Intermediate Representation Source Code with NSGA-II -- 1 Introduction -- 2 Background -- 3 Problem Definition -- 4 Evolutionary Multi-objective Optimization -- 5 Experimental Setup -- 6 Validation and Experimental Results -- 7 Conclusions and Future Work -- References -- A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study -- 1 Introduction -- 2 Background -- 3 Network Topology Generation with Deep Learning -- 3.1 UGR'16 Dataset: The Neris Botnet -- 3.2 Proposed Methodology -- 4 Experimental Design -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- ICEUTE.
,
Evaluating Classifiers' Performance to Detect Attacks in Website Traffic -- 1 Introduction and Previous Work -- 2 Applied Methods -- 2.1 Information Gain -- 2.2 The LASSO -- 2.3 Support Vector Machines -- 2.4 k-Nearest Neighbour -- 3 Dataset on Web Attacks -- 4 Results -- 5 Conclusions and Future Work -- References -- Evaluation of an Interactive Guide for Robotics Self-learning -- 1 Introduction -- 2 Interactive Guide for Robotics Self-learning -- 2.1 Didactic Objectives -- 2.2 Sections -- 3 Results -- 4 Conclusions and Future Works -- References -- Gamifying the Classroom for the Acquisition of Skills Associated with Machine Learning: A Two-Year Case Study -- 1 Introduction -- 2 Gamification in Data Science and Machine Learning -- 3 Development of the Innovation Experience -- 3.1 Objectives -- 3.2 Materials and Methods -- 4 Results -- 4.1 Assessment Questionnaires -- 4.2 Results of the Teaching Innovation Experience -- 5 Conclusions -- References -- Hackathon in Teaching: Applying Machine Learning to Life Sciences Tasks -- 1 Introduction -- 2 Development of the Innovation Experience -- 2.1 Objectives -- 2.2 Materials and Methods -- 3 Results -- 3.1 Knowledge Assessment Questionnaires -- 3.2 Self-assessment -- 3.3 Qualitative Analysis -- 3.4 Results of the Teaching Innovation Experience -- 3.5 Strengths and Weaknesses of the Project -- 4 Conclusions -- References -- Digital Platforms for Education. The Case of e4you -- 1 Introduction -- 2 Materials and Methods -- 2.1 The e4you Platform -- 3 Teacher-Student Interaction. The Environment -- 3.1 Teacher-Platform Interaction -- 3.2 Learner-Platform Interaction -- 4 Main Results of Educacional Interacion -- 5 Conclusions -- References -- 3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology -- 1 Introduction -- 2 Materials and Methods -- 2.1 Background.
,
2.2 Virtual Plant with Factory I/O.
Permalink