{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:54:44Z","timestamp":1771700084447,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":79,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819997848","type":"print"},{"value":"9789819997855","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9785-5_14","type":"book-chapter","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:02:05Z","timestamp":1706983325000},"page":"190-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["From Passive Defense to\u00a0Proactive Defence: Strategies and\u00a0Technologies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6500-8633","authenticated-orcid":false,"given":"Chong","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4296-6376","authenticated-orcid":false,"given":"Jiahao","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1453-6960","authenticated-orcid":false,"given":"Shuying","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2837-5157","authenticated-orcid":false,"given":"Xiaojun","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"key":"14_CR1","first-page":"1","volume":"2022","author":"M Mijwil","year":"2022","unstructured":"Mijwil, M., et al.: Cybersecurity challenges in smart cities: an overview and future prospects. Mesop. J. Cybersecur. 2022, 1\u20134 (2022)","journal-title":"Mesop. J. Cybersecur."},{"key":"14_CR2","unstructured":"Sahana, Y.P., Gotkhindikar, A., Tiwari, S.K.: Survey on can-bus packet filtering firewall. In: 2022 International Conference on Edge Computing and Applications (ICECAA). IEEE (2022)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Sreelaja, N.K.: A fireworks-based approach for efficient packet filtering in firewall. In: Handbook of Research on Fireworks Algorithms and Swarm Intelligence. IGI Global, pp. 315\u2013333 (2020)","DOI":"10.4018\/978-1-7998-1659-1.ch014"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1109\/TIFS.2021.3057552","volume":"16","author":"L Durante","year":"2021","unstructured":"Durante, L., Seno, L., Valenzano, A.: A formal model and technique to redistribute the packet filtering load in multiple firewall networks. IEEE Trans. Inf. Forensics Secur. 16, 2637\u20132651 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Malikovich, K.M., Rajaboevich, G.S., Karamatovich, Y.B.: Method of constructing packet filtering rules. In: 2019 International Conference on Information Science and Communications Technologies (ICISCT). IEEE (2019)","DOI":"10.1109\/ICISCT47635.2019.9011933"},{"key":"14_CR6","unstructured":"Ari Muzakir, A.: Analisis Kinerja Packet Filtering Berbasis Mikrotik Routerboard Pada Sistem Keamanan Jaringan. Analisis Kinerja Packet Filtering Berbasis Mikrotik Routerboard pada Sistem Keamanan Jaringan (2022)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Liang, J., Kim, Y.: Evolution of firewalls: toward securer network using next generation firewall. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC). IEEE (2022)","DOI":"10.1109\/CCWC54503.2022.9720435"},{"key":"14_CR8","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1007\/978-3-030-12385-7_71","volume-title":"Advances in Information and Communication","author":"S Jingyao","year":"2020","unstructured":"Jingyao, S., Chandel, S., Yunnan, Yu., Jingji, Z., Zhipeng, Z.: Securing a network: how effective using firewalls and VPNs are? In: Arai, K., Bhatia, R. (eds.) FICC 2019. LNNS, vol. 70, pp. 1050\u20131068. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-12385-7_71"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Muzaki, R.A., et al.: Improving security of web-based application using ModSecurity and reverse proxy in web application firewall. In: 2020 International Workshop on Big Data and Information Security (IWBIS). IEEE (2020)","DOI":"10.1109\/IWBIS50925.2020.9255601"},{"issue":"4","key":"14_CR10","first-page":"1","volume":"6","author":"Q Yina","year":"2022","unstructured":"Yina, Q.: Discussion on computer network security technology and firewall technology. Int. J. New Dev. Eng. Soc. 6(4), 1\u20135 (2022)","journal-title":"Int. J. New Dev. Eng. Soc."},{"issue":"5","key":"14_CR11","doi-asserted-by":"publisher","first-page":"3371","DOI":"10.1109\/TDSC.2021.3095417","volume":"19","author":"M Amouei","year":"2021","unstructured":"Amouei, M., Rezvani, M., Fateh, M.: RAT: reinforcement-learning-driven and adaptive testing for vulnerability discovery in web application firewalls. IEEE Trans. Dependable Secure Comput. 19(5), 3371\u20133386 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-020-07608-4","volume":"115","author":"J Praise","year":"2020","unstructured":"Praise, J., Jeya, R., Raj, J.S., Bibal Benifa, J.V.: Development of reinforcement learning and pattern matching (RLPM) based firewall for secured cloud infrastructure. Wirel. Personal Commun. 115, 993\u20131018 (2020)","journal-title":"Wirel. Personal Commun."},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"3526","DOI":"10.1109\/TIFS.2020.2990786","volume":"15","author":"S Bagheri","year":"2020","unstructured":"Bagheri, S., Shameli-Sendi, A.: Dynamic firewall decomposition and composition in the cloud. IEEE Trans. Inf. Forensics Secur. 15, 3526\u20133539 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Chebrolu, C.S., Chung-Horng, L., Ajila, S.A.: Dynamic packet filtering using machine learning. In: 2022 IEEE 23rd International Conference on Information Reuse and Integration for Data Science (IRI). IEEE (2022)","DOI":"10.1109\/IRI54793.2022.00053"},{"issue":"2","key":"14_CR15","first-page":"116","volume":"1","author":"E Kailanya","year":"2022","unstructured":"Kailanya, E., Mwadulo, M., Omamo, A.: Dynamic deep stateful firewall packet analysis model. Afr. J. Sci. Technol. Soc. Sci. 1(2), 116\u2013123 (2022)","journal-title":"Afr. J. Sci. Technol. Soc. Sci."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Malikovich, K.M., Rajaboevich, G.S., Karamatovich, Y.B.: Method of constructing packet filtering rules. In: 2019 International Conference on Information Science and Communications Technologies (ICISCT). IEEE (2019)","DOI":"10.1109\/ICISCT47635.2019.9011933"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: Proceedings of the Third ACM Workshop on Role-Based Access Control (1998)","DOI":"10.1145\/286884.286893"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/11908739_29","volume-title":"Advances in Information and Computer Security","author":"S Dranger","year":"2006","unstructured":"Dranger, S., Sloan, R.H., Solworth, J.A.: The complexity of discretionary access control. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 405\u2013420. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11908739_29"},{"key":"14_CR19","unstructured":"Solworth, J.A., Sloan, R.H.: A layered design of discretionary access controls with decidable safety properties. In: Proceedings of IEEE Symposium on Security and Privacy, 2004. IEEE (2004)"},{"key":"14_CR20","first-page":"17","volume":"2022","author":"K Vijayalakshmi","year":"2021","unstructured":"Vijayalakshmi, K., Jayalakshmi, V.: A study on current research and challenges in attribute-based access control model. Intell. Data Commun. Technol. Internet Things Proc. ICICI 2022, 17\u201331 (2021)","journal-title":"Intell. Data Commun. Technol. Internet Things Proc. ICICI"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/1560885","volume":"2022","author":"MU Aftab","year":"2022","unstructured":"Aftab, M.U., et al.: Traditional and hybrid access control models: a detailed survey. Secur. Commun. Netw. 2022, 1\u20135 (2022)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3368\/jhr.57.1.0918-9729R2","volume":"57","author":"R Gihleb","year":"2022","unstructured":"Gihleb, R., Giuntella, O., Zhang, N.: The effect of mandatory-access prescription drug monitoring programs on foster care admissions. J. Human Resourc. 57(1), 217\u2013240 (2022)","journal-title":"J. Human Resourc."},{"issue":"14","key":"14_CR23","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.3390\/electronics11142225","volume":"11","author":"S Namane","year":"2022","unstructured":"Namane, S., Dhaou, I.B.: Blockchain-based access control techniques for IoT applications. Electronics 11(14), 2225 (2022)","journal-title":"Electronics"},{"issue":"4","key":"14_CR24","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1109\/THMS.2022.3163185","volume":"52","author":"G Fragkos","year":"2022","unstructured":"Fragkos, G., Johnson, J., Tsiropoulou, E.E.: Dynamic role-based access control policy for smart grid applications: an offline deep reinforcement learning approach. IEEE Trans. Human-Mach. Syst. 52(4), 761\u2013773 (2022)","journal-title":"IEEE Trans. Human-Mach. Syst."},{"issue":"2","key":"14_CR25","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3390\/info13020060","volume":"13","author":"S Ameer","year":"2022","unstructured":"Ameer, S., Benson, J., Sandhu, R.: An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-based approach. Information 13(2), 60 (2022)","journal-title":"Information"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Kormpakis, G., et al.: An advanced visualisation engine with role-based access control for building energy visual analytics. In: 2022 13th International Conference on Information, Intelligence, Systems Applications (IISA). IEEE (2022)","DOI":"10.1109\/IISA56318.2022.9904353"},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"12253","DOI":"10.1109\/ACCESS.2020.2965333","volume":"8","author":"R Ghazal","year":"2020","unstructured":"Ghazal, R., et al.: Intelligent role-based access control model and framework using semantic business roles in multi-domain environments. IEEE Access 8, 12253\u201312267 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"14_CR28","doi-asserted-by":"publisher","first-page":"492","DOI":"10.3390\/sym13030492","volume":"13","author":"ST Alshammari","year":"2021","unstructured":"Alshammari, S.T., Albeshri, A., Alsubhi, K.: Integrating a high-reliability multicriteria trust evaluation model with task role-based access control for cloud services. Symmetry 13(3), 492 (2021)","journal-title":"Symmetry"},{"key":"14_CR29","doi-asserted-by":"publisher","first-page":"38431","DOI":"10.1109\/ACCESS.2019.2905846","volume":"7","author":"S Ding","year":"2019","unstructured":"Ding, S., et al.: A novel attribute-based access control scheme using blockchain for IoT. IEEE Access 7, 38431\u201338441 (2019)","journal-title":"IEEE Access"},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"107200","DOI":"10.1109\/ACCESS.2021.3101218","volume":"9","author":"S Bhatt","year":"2021","unstructured":"Bhatt, S., et al.: Attribute-based access control for AWS internet of things and secure industries of the future. IEEE Access 9, 107200\u2013107223 (2021)","journal-title":"IEEE Access"},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.future.2022.01.003","volume":"131","author":"SF Aghili","year":"2022","unstructured":"Aghili, S.F., et al.: MLS-ABAC: efficient multi-level security attribute-based access control scheme. Future Gener. Comput. Syst. 131, 75\u201390 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Guo, H., Meamari, E., Shen, C.-C.: Multi-authority attribute-based access control with smart contract. In: Proceedings of the 2019 International Conference on Blockchain Technology (2019)","DOI":"10.1145\/3320154.3320164"},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/j.future.2020.09.021","volume":"115","author":"H Zhong","year":"2021","unstructured":"Zhong, H., et al.: An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Gener. Comput. Syst. 115, 486\u2013496 (2021)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"14_CR34","first-page":"256","volume":"12","author":"MN Alenezi","year":"2020","unstructured":"Alenezi, M.N., Alabdulrazzaq, H., Mohammad, N.Q.: Symmetric encryption algorithms: review and evaluation study. Int. J. Commun. Netw. Inf. Secur. 12(2), 256\u2013272 (2020)","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"14_CR35","doi-asserted-by":"publisher","first-page":"1538","DOI":"10.1109\/TIFS.2020.3033412","volume":"16","author":"K He","year":"2020","unstructured":"He, K., et al.: Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Trans. Inf. Forensics Secur. 16, 1538\u20131549 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"14_CR36","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TDSC.2019.2894411","volume":"18","author":"J Li","year":"2019","unstructured":"Li, J., et al.: Searchable symmetric encryption with forward search privacy. IEEE Trans. Dependable Secure Comput. 18(1), 460\u2013474 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Patranabis, S., Mukhopadhyay, D.: Forward and backward private conjunctive searchable symmetric encryption. Cryptology ePrint Archive (2020)","DOI":"10.14722\/ndss.2021.23116"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Gui, Z., Paterson, K.G., Patranabis, S.: Rethinking searchable symmetric encryption. In: 2023 IEEE Symposium on Security and Privacy (SP). IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179460"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Q.: An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In: 2021 2nd International Conference on Computing and Data Science (CDS). IEEE (2021)","DOI":"10.1109\/CDS52072.2021.00111"},{"key":"14_CR40","first-page":"238","volume":"7","author":"AS Sharifovich","year":"2022","unstructured":"Sharifovich, A.S., Maxmudovich, H.X., Mansurovich, B.M.: Protocol for electronic digital signature of asymmetric encryption algorithm, based on asymmetric encryption algorithm based on the complexity of prime decomposition of a sufficiently large natural number. Texas J. Multidiscip. Stud. 7, 238\u2013241 (2022)","journal-title":"Texas J. Multidiscip. Stud."},{"key":"14_CR41","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.optlaseng.2018.12.010","volume":"116","author":"G Verma","year":"2019","unstructured":"Verma, G., et al.: An optical asymmetric encryption scheme with biometric keys. Optics Lasers Eng. 116, 32\u201340 (2019)","journal-title":"Optics Lasers Eng."},{"issue":"18","key":"14_CR42","doi-asserted-by":"publisher","first-page":"28265","DOI":"10.1007\/s11042-021-11043-3","volume":"80","author":"Z Bao","year":"2021","unstructured":"Bao, Z., Xue, R., Jin, Y.: Image scrambling adversarial autoencoder based on the asymmetric encryption. Multimed. Tools App. 80(18), 28265\u201328301 (2021)","journal-title":"Multimed. Tools App."},{"issue":"1","key":"14_CR43","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1038\/s41377-021-00581-y","volume":"10","author":"Z Hu","year":"2021","unstructured":"Hu, Z., et al.: Reversible 3D optical data storage and information encryption in photo-modulated transparent glass medium. Light Sci. App. 10(1), 140 (2021)","journal-title":"Light Sci. App."},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Jiang, F., et al.: Research on the application of transparent encryption in distributed file system HDFS. In: 2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES). IEEE (2020)","DOI":"10.1109\/DCABES50732.2020.00011"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Su, N., Zhang, Y., Li, M.: Research on data encryption standard based on AES algorithm in internet of things environment. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE (2019)","DOI":"10.1109\/ITNEC.2019.8729488"},{"issue":"2","key":"14_CR46","doi-asserted-by":"publisher","first-page":"8","DOI":"10.48161\/qaj.v1n2a38","volume":"1","author":"AA Yazdeen","year":"2021","unstructured":"Yazdeen, A.A., et al.: FPGA implementations for data encryption and decryption via concurrent and parallel computation: a review. Qubahan Acad. J. 1(2), 8\u201316 (2021)","journal-title":"Qubahan Acad. J."},{"issue":"4","key":"14_CR47","doi-asserted-by":"publisher","first-page":"101","DOI":"10.3390\/bdcc6040101","volume":"6","author":"MN Ramachandra","year":"2022","unstructured":"Ramachandra, M.N., et al.: An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data Cogn. Comput. 6(4), 101 (2022)","journal-title":"Big Data Cogn. Comput."},{"key":"14_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-030-58817-5_36","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2020","author":"ON Akande","year":"2020","unstructured":"Akande, O.N., Abikoye, O.C., Kayode, A.A., Aro, O.T., Ogundokun, O.R.: A dynamic round triple data encryption standard cryptographic technique for data security. In: Gervasi, O., et al. (eds.) ICCSA 2020. LNCS, vol. 12254, pp. 487\u2013499. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58817-5_36"},{"issue":"2","key":"14_CR49","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., et al.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"14_CR50","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"14_CR51","doi-asserted-by":"publisher","first-page":"6785","DOI":"10.1016\/j.aej.2021.12.023","volume":"61","author":"G Ye","year":"2022","unstructured":"Ye, G., Liu, M., Mingfa, W.: Double image encryption algorithm based on compressive sensing and elliptic curve. Alex. Eng. J. 61(9), 6785\u20136795 (2022)","journal-title":"Alex. Eng. J."},{"key":"14_CR52","doi-asserted-by":"publisher","unstructured":"Cui, H., et al.: TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps. In: Su, C., Sakurai, K., Liu, F. (eds.) Science of Cyber Security. SciSec 2022. LNCS, vol. 13580, pp. 541\u2013556. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17551-0_35","DOI":"10.1007\/978-3-031-17551-0_35"},{"key":"14_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103364","volume":"76","author":"SK Singh","year":"2022","unstructured":"Singh, S.K., Yi, P., Park, J.H.: Blockchain-enabled secure framework for energy-efficient smart parking in sustainable city environment. Sustainable Cities Soc. 76, 103364 (2022)","journal-title":"Sustainable Cities Soc."},{"key":"14_CR54","first-page":"1","volume":"2022","author":"S Kaur","year":"2022","unstructured":"Kaur, S., Kaur, G., Shabaz, M.: A secure two-factor authentication framework in cloud computing. Secur. Commun. Netw. 2022, 1\u20139 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"14_CR55","doi-asserted-by":"crossref","unstructured":"Watters, P., et al.: This would work perfectly if it weren\u2019t for all the humans: two factor authentication in late modern societies. First Monday (2019)","DOI":"10.5210\/fm.v24i7.10095"},{"key":"14_CR56","doi-asserted-by":"crossref","unstructured":"Palma, D., Montessoro, P.L.: Biometric-based human recognition systems: an overview. In: Recent Advances Biometrics, pp. 1\u201321 (2022)","DOI":"10.5772\/intechopen.101686"},{"key":"14_CR57","first-page":"309","volume":"2022","author":"V Singh","year":"2021","unstructured":"Singh, V., Kant, C.: Biometric-based authentication in Internet of Things (IoT): a review. Adv. Inf. Commun. Technol. Comput. Proc. AICTC 2022, 309\u2013317 (2021)","journal-title":"Adv. Inf. Commun. Technol. Comput. Proc. AICTC"},{"key":"14_CR58","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.patrec.2020.08.017","volume":"138","author":"B Bera","year":"2020","unstructured":"Bera, B., et al.: On the design of biometric-based identity authentication protocol in smart city environment. Pattern Recogn. Lett. 138, 439\u2013446 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"14_CR59","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2019.01.007","volume":"83","author":"S Gupta","year":"2019","unstructured":"Gupta, S., Buriro, A., Crispo, B.: DriverAuth: a risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. Comput. Secur. 83, 122\u2013139 (2019)","journal-title":"Comput. Secur."},{"key":"14_CR60","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-981-13-7403-6_44","volume-title":"Emerging Technology in Modelling and Graphics","author":"S Sengupta","year":"2020","unstructured":"Sengupta, S.: A secured biometric-based authentication scheme in IoT-based patient monitoring system. In: Mandal, J.K., Bhattacharya, D. (eds.) Emerging Technology in Modelling and Graphics. AISC, vol. 937, pp. 501\u2013518. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-7403-6_44"},{"issue":"1","key":"14_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-021-00548-4","volume":"2021","author":"J Priesnitz","year":"2021","unstructured":"Priesnitz, J., et al.: An overview of touchless 2D fingerprint recognition. EURASIP J. Image Video Process. 2021(1), 1\u201328 (2021)","journal-title":"EURASIP J. Image Video Process."},{"issue":"1","key":"14_CR62","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1038\/s41598-021-04652-3","volume":"12","author":"V Rajasekar","year":"2022","unstructured":"Rajasekar, V., et al.: Enhanced multimodal biometric recognition approach for smart cities based on an optimized fuzzy genetic algorithm. Sci. Rep. 12(1), 622 (2022)","journal-title":"Sci. Rep."},{"key":"14_CR63","doi-asserted-by":"publisher","first-page":"136570","DOI":"10.1109\/ACCESS.2020.3011364","volume":"8","author":"A Boyd","year":"2020","unstructured":"Boyd, A., et al.: Post-mortem iris recognition-a survey and assessment of the state of the art. IEEE Access 8, 136570\u2013136593 (2020)","journal-title":"IEEE Access"},{"key":"14_CR64","doi-asserted-by":"publisher","first-page":"2944","DOI":"10.1109\/TIFS.2020.2980791","volume":"15","author":"C Wang","year":"2020","unstructured":"Wang, C., et al.: Towards complete and accurate iris segmentation using deep multi-task attention network for non-cooperative iris recognition. IEEE Trans. Inf. Forensics Secur. 15, 2944\u20132959 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113114","volume":"143","author":"S Dargan","year":"2020","unstructured":"Dargan, S., Kumar, M.: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst. Appl. 143, 113114 (2020)","journal-title":"Expert Syst. Appl."},{"issue":"21","key":"14_CR66","doi-asserted-by":"publisher","first-page":"8952","DOI":"10.3390\/su12218952","volume":"12","author":"G Capece","year":"2020","unstructured":"Capece, G., Ghiron, N.L., Pasquale, F.: Blockchain technology: redefining trust for digital certificates. Sustainability 12(21), 8952 (2020)","journal-title":"Sustainability"},{"issue":"4","key":"14_CR67","doi-asserted-by":"publisher","first-page":"308","DOI":"10.22201\/icat.24486736e.2021.19.4.1046","volume":"19","author":"U Rahardja","year":"2021","unstructured":"Rahardja, U., et al.: Immutable ubiquitous digital certificate authentication using blockchain protocol. J. Appl. Res. Technol. 19(4), 308\u2013321 (2021)","journal-title":"J. Appl. Res. Technol."},{"issue":"1","key":"14_CR68","doi-asserted-by":"publisher","first-page":"136","DOI":"10.34306\/ijcitsm.v1i1.40","volume":"1","author":"G Maulani","year":"2021","unstructured":"Maulani, G., et al.: Digital certificate authority with blockchain cybersecurity in education. Int. J. Cyber IT Serv. Manage. 1(1), 136\u2013150 (2021)","journal-title":"Int. J. Cyber IT Serv. Manage."},{"issue":"3","key":"14_CR69","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1049\/iet-ifs.2017.0086","volume":"12","author":"H Hu","year":"2018","unstructured":"Hu, H., et al.: Mimic defense: a designed-in cybersecurity defense framework. IET Inf. Secur. 12(3), 226\u2013237 (2018)","journal-title":"IET Inf. Secur."},{"key":"14_CR70","doi-asserted-by":"crossref","unstructured":"Zhuang, R., et al.: A theory of cyber attacks: a step towards analyzing MTD systems. In: Proceedings of the Second ACM Workshop on Moving Target Defense (2015)","DOI":"10.1145\/2808475.2808478"},{"key":"14_CR71","unstructured":"Reynolds, J., et al.: The design and implementation of an intrusion tolerant system. In: Proceedings International Conference on Dependable Systems and Networks. IEEE (2002)"},{"key":"14_CR72","unstructured":"Wang, F., et al.: SITAR: a scalable intrusion-tolerant architecture for distributed services. In: Workshop on Information Assurance and Security, vol. 1 (2003)"},{"key":"14_CR73","unstructured":"Cachin, C., et al.: Malicious-and Accidental-Fault Tolerance in Internet Applications: reference model and use cases (2000)"},{"key":"14_CR74","doi-asserted-by":"crossref","unstructured":"Pal, P., et al.: Intrusion tolerance by unpredictable adaptation (ITUA). Technical report. AFRL-IF-RS-TR-2005-119 (2005)","DOI":"10.21236\/ADA433567"},{"key":"14_CR75","doi-asserted-by":"crossref","unstructured":"Bangalore, A.K., Sood, A.K.: Securing web servers using self cleansing intrusion tolerance (SCIT). In: 2009 Second International Conference on Dependability. IEEE (2009)","DOI":"10.1109\/DEPEND.2009.15"},{"key":"14_CR76","doi-asserted-by":"crossref","unstructured":"Huang, Y., Anup K. Ghosh. \"Introducing diversity and uncertainty to create moving attack surfaces for web services. In: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, pp. 131\u2013151.Springer, New York, NY (2011)","DOI":"10.1007\/978-1-4614-0977-9_8"},{"issue":"1","key":"14_CR77","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ijcip.2012.01.002","volume":"5","author":"H Okhravi","year":"2012","unstructured":"Okhravi, H., et al.: Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Critical Infrastruct. Protect. 5(1), 30\u201339 (2012)","journal-title":"Int. J. Critical Infrastruct. Protect."},{"key":"14_CR78","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: A router abnormal traffic detection strategy based on active defense. In: Journal of Physics: Conference Series. Vol. 1738. No. 1. IOP Publishing (2021)","DOI":"10.1088\/1742-6596\/1738\/1\/012103"},{"issue":"4","key":"14_CR79","first-page":"883","volume":"28","author":"Q Tong","year":"2017","unstructured":"Tong, Q., et al.: Design and implementation of mimic defense Web server. J. Softw. 28(4), 883\u2013897 (2017)","journal-title":"J. Softw."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9785-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:10:56Z","timestamp":1706983856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9785-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819997848","9789819997855"],"references-count":79,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9785-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/aisp2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23 large model and security workshop papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}