top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Privacy Management and Autonomous Spontaneous Security : 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier
Data Privacy Management and Autonomous Spontaneous Security : 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 265 p. 50 illus.)
Disciplina 005.437
4.019
Collana Security and Cryptology
Soggetto topico User interfaces (Computer systems)
Computers
Law and legislation
Computers and civilization
Computer security
Data encryption (Computer science)
Computer communication systems
User Interfaces and Human Computer Interaction
Legal Aspects of Computing
Computers and Society
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 1-280-38537-5
9786613563293
3-642-11207-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Talks -- The UNESCO Chair in Data Privacy Research in Vehicular Networks -- Privacy Management for Global Organizations -- Data Privacy Management -- Obligation Language and Framework to Enable Privacy-Aware SOA -- Distributed Privacy-Preserving Methods for Statistical Disclosure Control -- Towards a Privacy-Preserving National Identity Card -- Using SAT-Solvers to Compute Inference-Proof Database Instances -- A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem -- A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search -- Visualizing Privacy Implications of Access Control Policies in Social Network Systems -- Contextual Privacy Management in Extended Role Based Access Control Model -- Autonomous and Spontaneous Security -- Dynamic Security Rules for Geo Data -- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking -- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets) -- Untraceable Tags Based on Mild Assumptions -- Security Threat Mitigation Trends in Low-Cost RFID Systems -- An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification -- DDoS Defense Mechanisms: A New Taxonomy -- RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems -- Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges.
Record Nr. UNINA-9910483479003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Protection in the Internet / / edited by Dário Moura Vicente, Sofia de Vasconcelos Casimiro
Data Protection in the Internet / / edited by Dário Moura Vicente, Sofia de Vasconcelos Casimiro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (540 pages)
Disciplina 658.478
343.0999
Collana Ius Comparatum - Global Studies in Comparative Law
Soggetto topico Private international law
Conflict of laws
Mass media
Law
Computers
Law and legislation
Computer security
Private International Law, International & Foreign Law, Comparative Law
IT Law, Media Law, Intellectual Property
Legal Aspects of Computing
Systems and Data Security
ISBN 3-030-28049-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Protection in the Internet: General Report -- Right to Privacy and Personal Data Protection in Brazilian Law -- Data Protection and the Internet: Canada -- Data Protection in the Internet: Cape Verde’s National Report -- National Report: Czech Republic -- Data Protection in the Internet: French Report -- Data Protection in the Internet: National Report Germany -- Data Protection in the Internet: Greece -- Italian National Report: Data Protection in the Internet -- Data Protection in the Internet: Japanese National Report -- Data Protection in the Internet: The Portuguese Case -- Data Protection Regulations: Overview of the Romanian Legislation and Deficiencies -- Singapore Report: Data Protection in the Internet -- Data Protection in the Internet: South Africa -- Data Protection in the Internet: National Report Spain -- Swiss Data Protection Law -- Data Protection in the United States: U.S. National Report -- Data Protection in the Internet: A European Union Perspective -- Data Protection in International Trade Law -- UN Regulations.
Record Nr. UNINA-9910366574203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security [[electronic resource] ] : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán
Decision and Game Theory for Security [[electronic resource] ] : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xi, 584 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Computers
Law and legislation
Application software
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
ISBN 3-030-32430-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Game theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security.
Record Nr. UNISA-996466323303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán
Decision and Game Theory for Security : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xi, 584 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Artificial intelligence
Computer communication systems
Computers
Law and legislation
Application software
Systems and Data Security
Artificial Intelligence
Computer Communication Networks
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
ISBN 3-030-32430-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Game theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security.
Record Nr. UNINA-9910349271703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Den Tätern auf der Spur [[electronic resource] ] : Spannende Fälle aus IT-Sicherheit und IT-Forensik / / von Alexander Dörsam
Den Tätern auf der Spur [[electronic resource] ] : Spannende Fälle aus IT-Sicherheit und IT-Forensik / / von Alexander Dörsam
Autore Dörsam Alexander
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 182 S. 7 Abb., 1 Abb. in Farbe.)
Disciplina 000
Soggetto topico Computer science
Computers
Law and legislation
Computer security
Application software
Popular Computer Science
Legal Aspects of Computing
Systems and Data Security
Information Systems Applications (incl. Internet)
ISBN 3-658-16466-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910484219703321
Dörsam Alexander  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Designing for Privacy and its Legal Framework : Data Protection by Design and Default for the Internet of Things / / by Aurelia Tamò-Larrieux
Designing for Privacy and its Legal Framework : Data Protection by Design and Default for the Internet of Things / / by Aurelia Tamò-Larrieux
Autore Tamò-Larrieux Aurelia
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (254 pages)
Disciplina 342.240858
Collana Issues in Privacy and Data Protection
Soggetto topico Law—Europe
Information technology—Law and legislation
Mass media—Law and legislation
Data protection—Law and legislation
Computers—Law and legislation
European Law
IT Law, Media Law, Intellectual Property
Privacy
Legal Aspects of Computing
ISBN 3-319-98624-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Setting the Stage -- 2 Research Approach -- 3 Mapping the Privacy Rationales -- 4 Privacy Protection in an Internet of Things Environment -- 5 Privacy and Data Protection Regulation in Europe -- 6 Technical Tools and Designs for Data Protection -- 7 Mapping the Privacy Protection Tools throughout the Life Cycle of Data -- 8 Interplay of Legal and Technical Privacy Protection Tools -- 9 Privacy by Design for the Internet of Things: a Startup Scenario -- 10 Strengthening Privacy by Design -- 11 Conclusion.
Record Nr. UNINA-9910300058103321
Tamò-Larrieux Aurelia  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Data encryption (Computer science)
Software engineering
Law and legislation
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Cryptology
Software Engineering/Programming and Operating Systems
Legal Aspects of Computing
ISBN 3-030-52683-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
Record Nr. UNISA-996418289503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Data encryption (Computer science)
Software engineering
Law and legislation
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Cryptology
Software Engineering/Programming and Operating Systems
Legal Aspects of Computing
ISBN 3-030-52683-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
Record Nr. UNINA-9910413445303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 405 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
ISBN 3-319-93411-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering.
Record Nr. UNISA-996465795703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Detection of Intrusions and Malware, and Vulnerability Assessment : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 405 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
ISBN 3-319-93411-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering.
Record Nr. UNINA-9910349434403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui