| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISANNIORMS2288358 |
|
|
Autore |
Punzi, Carmine |
|
|
Titolo |
2: La fase di cognizione nella tutela dei diritti / Carmine Punzi |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Torino, : Giappichelli, 2010 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[2. ed] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Processo civile - Legislazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910447250703321 |
|
|
Titolo |
Information Systems Security : 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings / / edited by Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XX, 289 p. 83 illus., 56 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 12553 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer networks |
Coding theory |
Information theory |
Computers |
Data and Information Security |
Computer Communication Networks |
Coding and Information Theory |
Computing Milieux |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Access Control -- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT -- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against Trojan Attacks on Deep Neural Networks -- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning -- Machine Learning based Android Vulnerability Detection: A Roadmap -- Privacy and Web Security -- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach -- Privacy-Preserving Friend Recommendation in an Integrated Social Environment -- A Toolkit for Security Awareness Training against Targeted Phishing -- Forensic Source Identification of OSN Compressed Images -- Cryptography -- Cheating Detectable |
|
|
|
|
|
|
|
|
|
|
|
Ramp Secret Sharing with Optimal Cheating Resiliency -- LiARX: A Lightweight Cipher based on the LTS DesignStrategy of ARX -- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings -- Systems Security -- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information -- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security -- Detection of Malign and Benign PE Files Using Texture Analysis -- Estimating the Cost of Cybersecurity Activities with CAsPeA. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security. |
|
|
|
|
|
|
|
| |