|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996495571503316 |
|
|
Titolo |
Innovative security solutions for information technology and communications : 14th international conference, SecITC 2021, virtual event, November 25-26, 2021, revised selected papers / / edited by Peter Y. A. Ryan and Cristian Toma |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (345 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science ; ; v.13195 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Telecommunication systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents -- KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch -- 1 Introduction -- 2 Related Work -- 3 Visualising and Investigating -- 3.1 Log Investigation -- 3.2 ZeroKit -- 3.3 Recommendation -- 4 Recommender System -- 4.1 Recommendation Process -- 4.2 Recommendation Triggers -- 4.3 Knowledge Base -- 4.4 Decision-Making -- 5 Evaluation -- 5.1 Datasets -- 5.2 Experimental Setup -- 5.3 User Feedback -- 5.4 Recommendation Relevance -- 5.5 Providing Assistance to Investigations -- 6 Conclusion -- References -- ADAM: Automatic Detection of Android Malware -- 1 Introduction -- 2 Related Works -- 3 ADAM: The Proposed Android Malware Detection -- 3.1 Dataset -- 3.2 Feature-Set Extraction -- 3.3 MRMR-Based Feature Selection -- 3.4 Training the Model -- 4 Performance Analysis -- 4.1 Discussion -- 4.2 Model Deployment -- 5 Conclusion -- References -- Attack on the Common Prime Version of Murru and Saettone's RSA Cryptosystem -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Organization of the Paper -- 2 Preliminaries -- 2.1 Murru and Saettone's RSA Cryptosystem -- 2.2 Lattice -- 2.3 Finding Small Roots -- 3 Attack on the Common Prime Variant of Murru and Saettone's RSA |
|
|
|
|