Cyber security intelligence and analytics : Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020).: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020). Volume 1 (2020)
- Record Type:
- Book
- Title:
- Cyber security intelligence and analytics : Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020).: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020). Volume 1 (2020)
- Main Title:
- Cyber security intelligence and analytics : Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020).
- Other Titles:
- CSIA 2020
- Further Information:
- Note: Zheng Xu, Reza M. Parizi, Mohammad Hammoudeh, Octavio Loyola-González, editors.
- Other Names:
- Xu, Zheng
Parizi, Reza M
Hammoudeh, Mohammad
Loyola-González, Octavio
International Conference on Cyber Security Intelligence and Analytics - Contents:
- Intro -- Foreword -- Organization -- Steering Committee Chair -- General Chair -- Program Committee Chairs -- Publication Chairs -- Publicity Chairs -- Local Organizing Chairs -- Program Committee Members -- Contents -- Technical Tracks 1: Cyber Intelligence and Analytics from Different Layers of Network Space Solutions -- Computer Network Information Security Protection Strategy Based on Clustering Algorithms -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Troubles in Computer Network Information Security -- 2.2 Cluster Analysis Technology -- 2.3 Improved K-Means Clustering Algorithms 3 Experimental Simulation and Experimental Data -- 4 Experiments and Discussions -- 4.1 Experimental Process -- 4.2 Experimental Summary -- 5 Conclusion -- References -- Network Communication Security Program Design Based on Wireless Router -- Abstract -- 1 Introduction -- 2 TCM Module Platform Structure -- 2.1 Trusted Cryptographic Module -- 2.2 Trusted Cryptographic Service Module (TSM) -- 3 TCM Certification Based on 802.1X -- 4 System Test -- 4.1 Test Process -- 4.2 Test Result Analysis -- 5 Conclusion -- References Network Intrusion Detection Model Based on Improved Convolutional Neural Network -- Abstract -- 1 Introduction -- 2 Convolution Neural Network Based on Genetic Algorithm -- 3 Intrusion Detection Experiment Based on Genetic Convolution Neural Network -- 3.1 Chromosome Coding and Fitness Function -- 3.2 Experimental Model Settings -- 3.3 Comparison Experiment Settings -- 3.4Intro -- Foreword -- Organization -- Steering Committee Chair -- General Chair -- Program Committee Chairs -- Publication Chairs -- Publicity Chairs -- Local Organizing Chairs -- Program Committee Members -- Contents -- Technical Tracks 1: Cyber Intelligence and Analytics from Different Layers of Network Space Solutions -- Computer Network Information Security Protection Strategy Based on Clustering Algorithms -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Troubles in Computer Network Information Security -- 2.2 Cluster Analysis Technology -- 2.3 Improved K-Means Clustering Algorithms 3 Experimental Simulation and Experimental Data -- 4 Experiments and Discussions -- 4.1 Experimental Process -- 4.2 Experimental Summary -- 5 Conclusion -- References -- Network Communication Security Program Design Based on Wireless Router -- Abstract -- 1 Introduction -- 2 TCM Module Platform Structure -- 2.1 Trusted Cryptographic Module -- 2.2 Trusted Cryptographic Service Module (TSM) -- 3 TCM Certification Based on 802.1X -- 4 System Test -- 4.1 Test Process -- 4.2 Test Result Analysis -- 5 Conclusion -- References Network Intrusion Detection Model Based on Improved Convolutional Neural Network -- Abstract -- 1 Introduction -- 2 Convolution Neural Network Based on Genetic Algorithm -- 3 Intrusion Detection Experiment Based on Genetic Convolution Neural Network -- 3.1 Chromosome Coding and Fitness Function -- 3.2 Experimental Model Settings -- 3.3 Comparison Experiment Settings -- 3.4 Experimental Results and Analysis -- 4 Conclusion -- References -- Overall Layout and Security Measures of Campus Wireless Local Area Networks -- Abstract -- 1 Introduction -- 2 Methods and Techniques 2.1 Demand of Campus Network -- 2.2 Network Structure and Engineering Wiring (Fig. 1) -- 2.3 Business Deployment of the Campus Wireless Network (Fig. 2) -- 2.4 Management Mode of Campus Wireless Network (Fig. 3) -- 3 Security of Campus WLAN -- 3.1 Common Security Risks of Campus Wireless Network -- 3.1.1 DSSS Risks -- 3.1.2 WEP Security Vulnerability -- 3.1.3 Hardware Stolen -- 3.1.4 Fake Access Point -- 3.1.5 Other Hidden Dangers -- 3.2 Prevention Strategies -- 3.2.1 WLAN Authentication -- 3.2.2 Reasonable Installation of Wireless Network Equipment 3.2.3 Using Static IP Address and Intrusion Detection Tool -- 3.2.4 Set up Additional Third-Party Data Encryption Scheme -- 4 Summary and Prospect -- References -- Application of Computer Network Anomaly Recognition Based on Artificial Intelligence -- Abstract -- 1 Introduction -- 2 Current Status of Artificial Intelligence in Network Anomaly Diagnostic Applications -- 3 Network Management Based on Artificial Intelligence -- 4 Analysis of Basic Characteristics of Network Anomaly -- 4.1 Hierarchy -- 4.2 Transmissibility -- 4.3 Correlation -- 4.4 Randomness … (more)
- Issue Display:
- Volume 1
- Volume:
- 1
- Issue Sort Value:
- 0000-0001-0000-0000
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (840 pages)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030433062
3030433064 - Related ISBNs:
- 9783030433055
- Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.497519
- Ingest File:
- 03_065.xml