Machine learning for cyber security 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023 : proceedings
Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform.- Strengthening Cyber Security Education Designing Robust Assessments for Chat GPT Generated Answers.- Pass File Graphical Password Authentication based on File Browsing Records.- On the Role of Similarity in Detecti...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Singapore
Springer
2024
|
Schriftenreihe: | Lecture notes in computer science
14541 |
Schlagworte: | |
Online Zugang: | Cover |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform.- Strengthening Cyber Security Education Designing Robust Assessments for Chat GPT Generated Answers.- Pass File Graphical Password Authentication based on File Browsing Records.- On the Role of Similarity in Detecting Masquerading Files.- A Password-based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN.- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle Road Collaboration.- A client side watermarking with private class in Federated learning.- Research on Evasion and Detection of Malicious JavaScript Code.- Tackling Non IID for Federated Learning with Components Alignment.- Security on top of Security Detecting Malicious Firewall Policy Changes via K Means Clustering.- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability. This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Security, ML4CS 2023, held in Yanuca Island, Fiji, during December 4-6, 2023. The 11 full papers presented in this book were carefully reviewed and selected from 35 submissions. They cover a variety of topics, including cybersecurity, AI security, machine learning security, encryption, authentication, data security and privacy, cybersecurity forensic analysis, vulnerability analysis, malware analysis, anomaly and intrusion detection |
---|---|
Beschreibung: | Literaturangaben |
Beschreibung: | xii, 174 Seiten Illustrationen, Diagramme |
ISBN: | 9789819724574 978-981-97-2457-4 |