LEADER 01133nam0-2200337---450- 001 990009527110403321 005 20120209145406.0 010 $a978-88-95440-03-3 035 $a000952711 035 $aFED01000952711 035 $a(Aleph)000952711FED01 035 $a000952711 100 $a20120209d2009----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $a2009----001yy 200 1 $aDiritto e tecnologie digitali per la valorizzazione e l'accessibilità delle conoscenze$erelazioni e saggi a margine di un Convegno$fa cura di Andrea Maggipinto e Giovanni d'Ammassa 210 $aMilano$cNyberg Edizioni$d2009 215 $a117 p.$d22 cm 225 1 $aDiritto di autore e nuove tecnologie$v1 610 0 $aBibliografia 610 0 $aBiblioteconomia 700 1$aMaggipinto,$bAndrea$0515243 701 1$ad'Ammassa,$bGiovanni$0476487 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009527110403321 952 $a02-063$bD.S.F. 9580$fFI1 959 $aFI1 996 $aDiritto e tecnologie digitali per la valorizzazione e l'accessibilità delle conoscenze$9855903 997 $aUNINA LEADER 01586nam 2200385 450 001 9910716940003321 005 20211116125455.0 035 $a(CKB)5470000002526797 035 $a(OCoLC)1285394924 035 $a(EXLCZ)995470000002526797 100 $a20211116d2021 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 12$aA report to the President of the United States from the Attorney General of the United States pursuant to the President's memorandum on restoring the Department of Justice's access-to-justice function 210 1$aWashington, D.C. :$cOffice of the Attorney General,$d2021. 215 $a1 online resource (24 pages) 300 $a"September 15, 2021." 320 $aIncludes bibliographical references. 606 $aEquality before the law$zUnited States 606 $aJustice, Administration of$zUnited States 606 $aRule of law$zUnited States 615 0$aEquality before the law 615 0$aJustice, Administration of 615 0$aRule of law 700 $aGarland$b Merrick B$g(Merrick Brian),$f1952-$01403692 712 02$aUnited States.$bDepartment of Justice.$bOffice of the Attorney General, 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910716940003321 996 $aA report to the President of the United States from the Attorney General of the United States pursuant to the President's memorandum on restoring the Department of Justice's access-to-justice function$93534507 997 $aUNINA LEADER 05290nam 22007815 450 001 9910447248603321 005 20251225190524.0 010 $a3-030-65745-0 024 7 $a10.1007/978-3-030-65745-1 035 $a(CKB)4100000011665328 035 $a(DE-He213)978-3-030-65745-1 035 $a(MiAaPQ)EBC6427553 035 $a(PPN)252514726 035 $a(EXLCZ)994100000011665328 100 $a20201218d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security $e14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25?27, 2020, Proceedings /$fedited by Miros?aw Kuty?owski, Jun Zhang, Chao Chen 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XIII, 448 p. 135 illus., 103 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12570 311 08$a3-030-65744-2 327 $aData Analytics of Crowdsourced Resources for Cybersecurity Intelligence -- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets -- EnCoD Distinguishing Compressed and Encrypted File Fragments -- A Weighted Voting Framework for Android App?s Vetting Based on Multiple Machine Learning Models -- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication -- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives -- Defending Against Package Typosquatting -- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network -- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack -- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging -- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher -- Model Poisoning Defense on Federated Learning: A Validation Based Approach -- Fixing Vulnerabilities Automatically with Linters -- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay -- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking -- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection -- AC0 Constructions of Secret Sharing Schemes ? Accommodating New Parties -- Multiply, Divide, and Conquer ? Making Fully Decentralised Access Control a Reality -- A Model Specification Implementation for Trust Negotiation -- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations -- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences -- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks -- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection -- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System -- The Impact of Differential Privacy on Model Fairness in Federated Learning -- Evading Stepping-Stone Detection with Enough Chaff. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12570 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aCoding theory 606 $aInformation theory 606 $aComputers 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aCoding and Information Theory 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aMobile and Network Security 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputers. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 14$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aCoding and Information Theory. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 676 $a005.8 702 $aKutyowski$b Mirosaw 702 $aZhang$b Jun 702 $aChen$b Chao 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910447248603321 996 $aNetwork and system security$92088039 997 $aUNINA