This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022.
The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
Reihe
Auflage
Sprache
Verlagsort
Verlagsgruppe
Illustrationen
25
106 farbige Abbildungen, 25 s/w Abbildungen
XIII, 430 p. 131 illus., 106 illus. in color.
ISBN-13
978-981-19-8445-7 (9789811984457)
DOI
10.1007/978-981-19-8445-7
Schweitzer Klassifikation
IoT Security
.- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT.- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles.- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building.- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things.-
Artificial Intelligence and Cyber Security
.- Cross-site Scripting Threat Intelligence Detection based on Deep Learning.- Power Analysis Attack Based on Lightweight Convolutional Neural Network.- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms.- SVFLS: A Secure and Verifiable Federated Learning Training Scheme.- A Pragmatic Label-Specific Backdoor Attack.- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source.-
Blockchain Technology and Application
.- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment.- Blockchain-based Patient-to-Patient Health Data Sharing.- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain.- Ethereum Contract Honeypot Risk Analysis.- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains.-
Cryptography
.- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme.- New Trapdoor and Preimage Sampling on NTRU Lattice.- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature.- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares.- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.-
Database Security
.- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme.- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern.- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing.-
Quantum Cryptography
.- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate.-
Network Security
.- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.