Silicon Valley Cybersecurity Conference
Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers
dc.contributor.editor | Bathen, Luis | |
dc.contributor.editor | Saldamli, Gokay | |
dc.contributor.editor | Sun, Xiaoyan | |
dc.contributor.editor | Austin, Thomas H. | |
dc.contributor.editor | Nelson, Alex J. | |
dc.date.accessioned | 2023-02-13T17:27:37Z | |
dc.date.available | 2023-02-13T17:27:37Z | |
dc.date.issued | 2022 | |
dc.identifier | ONIX_20230213_9783031240492_40 | |
dc.identifier.uri | https://library.oapen.org/handle/20.500.12657/61298 | |
dc.description.abstract | This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book. | |
dc.language | English | |
dc.relation.ispartofseries | Communications in Computer and Information Science | |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications | en_US |
dc.subject.other | artificial intelligence | |
dc.subject.other | blockchain | |
dc.subject.other | classification | |
dc.subject.other | computer crime | |
dc.subject.other | computer networks | |
dc.subject.other | computer security | |
dc.subject.other | computer systems | |
dc.subject.other | computer vision | |
dc.subject.other | cryptography | |
dc.subject.other | data communication systems | |
dc.subject.other | data security | |
dc.subject.other | distributed computer systems | |
dc.subject.other | distributed ledger | |
dc.subject.other | image analysis | |
dc.subject.other | intrusion detection | |
dc.subject.other | machine learning | |
dc.subject.other | network protocols | |
dc.subject.other | network security | |
dc.subject.other | parallel processing systems | |
dc.subject.other | query languages | |
dc.title | Silicon Valley Cybersecurity Conference | |
dc.title.alternative | Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers | |
dc.type | book | |
oapen.identifier.doi | 10.1007/978-3-031-24049-2 | |
oapen.relation.isPublishedBy | 6c6992af-b843-4f46-859c-f6e9998e40d5 | |
oapen.relation.isbn | 9783031240492 | |
oapen.imprint | Springer Nature Switzerland | |
oapen.series.number | 1683 | |
oapen.pages | 137 | |
oapen.place.publication | Cham |