LEADER 01521nam 2200505 450 001 9910796080503321 005 20230912171840.0 010 $a1-118-70515-7 035 $a(CKB)24989723000041 035 $a(Au-PeEL)EBL4497494 035 $a(CaPaEBR)ebr11201200 035 $a(CaONFJC)MIL913541 035 $a(OCoLC)946311280 035 $a(CaSebORM)9781118705148 035 $a(MiAaPQ)EBC4497494 035 $a(JP-MeL)3000110633 035 $a(MiAaPQ)EBC7103968 035 $a(EXLCZ)9924989723000041 100 $a20160420h20162016 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aFundamentals of quality control and improvement /$fAmitava Mitra 205 $aFourth edition. 210 1$aHoboken, New Jersey :$cWiley,$d2016. 210 4$d2016 215 $a1 online resource (819 pages) $cillustrations 300 $aPrevious ed.: 2008 300 $aIncludes bibliographical references and index 320 $aIncludes bibliographical references and index. 606 $aQuality control$xStatistical methods 615 0$aQuality control$xStatistical methods. 676 $a658.4/013 686 $a509.66$2njb/09 686 $a658.4013$2njb/09 700 $aMitra$b Amitava$0891732 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910796080503321 996 $aFundamentals of quality control and improvement$91991595 997 $aUNINA LEADER 04986nam 22006735 450 001 9910409672503321 005 20250829103157.0 010 $a3-030-45371-5 024 7 $a10.1007/978-3-030-45371-8 035 $a(CKB)4100000011223249 035 $a(MiAaPQ)EBC6177228 035 $a(DE-He213)978-3-030-45371-8 035 $a(PPN)243761074 035 $a(EXLCZ)994100000011223249 100 $a20200402d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e12th International Symposium, FPS 2019, Toulouse, France, November 5?7, 2019, Revised Selected Papers /$fedited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (415 pages) $cillustrations 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12056 311 08$a3-030-45370-7 327 $aMachine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance. 330 $aThis book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12056 606 $aData protection 606 $aDatabase management 606 $aComputer networks 606 $aArtificial intelligence 606 $aData and Information Security 606 $aDatabase Management System 606 $aComputer Communication Networks 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aDatabase management. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aDatabase Management System. 615 24$aComputer Communication Networks. 615 24$aArtificial Intelligence. 676 $a005.8 676 $a005.8 702 $aBenzekri$b Abdelmalek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBarbeau$b Michel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGong$b Guang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLaborde$b Romain$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910409672503321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA