TY - BOOK AU - Bathen,Luis AU - Saldamli,Gokay AU - Sun,Xiaoyan AU - Austin,Thomas H. AU - Nelson,Alex J. ED - SpringerLink (Online service) TI - Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers T2 - Communications in Computer and Information Science, SN - 9783031240492 AV - QA76.9.A25 U1 - 005.8 23 PY - 2022/// CY - Cham PB - Springer Nature Switzerland, Imprint: Springer KW - Data protection KW - Image processing KW - Digital techniques KW - Computer vision KW - Artificial intelligence KW - Computer engineering KW - Computer networks  KW - Data and Information Security KW - Computer Imaging, Vision, Pattern Recognition and Graphics KW - Artificial Intelligence KW - Computer Engineering and Networks N1 - Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford’s Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning; Open Access N2 - This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book UR - https://doi.org/10.1007/978-3-031-24049-2 ER -