top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Practices : Emerging Threats and Perspectives / / edited by Issa Traoré, Ahmed Awad, Isaac Woungang
Information Security Practices : Emerging Threats and Perspectives / / edited by Issa Traoré, Ahmed Awad, Isaac Woungang
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VII, 104 p. 51 illus., 31 illus. in color.)
Disciplina 621.382
Soggetto topico Electrical engineering
Computers
Computer security
System safety
Biometrics (Biology)
Communications Engineering, Networks
Information Systems and Communication Service
Systems and Data Security
Security Science and Technology
Biometrics
ISBN 3-319-48947-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1.Introduction – Emerging Threats call for New Security Paradigms -- Chapter 2. Botnets Threat Analysis and Detection -- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication -- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection -- Chapter 8. Conclusion: Future Trends and Challenges.
Record Nr. UNINA-9910157472703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments [[electronic resource] ] : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments [[electronic resource] ] : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXII, 183 p. 68 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer communication systems
Application software
Software engineering
User interfaces (Computer systems)
Personal computers
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
User Interfaces and Human Computer Interaction
Personal Computing
ISBN 3-319-69155-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Holistic model for HTTP botnet detection based on DNS traffic analysis -- Detecting broad length algorithmically generated domains -- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology -- Detecting command and control channel of botnets in clouds -- An experimental framework for investigating security and privacy of IoT devices -- Dynamic cypher for enhanced cryptography and communication for Internet of Things -- An inter-device authentication scheme for smart homes using one-time-password over infrared channel -- Detection and prevention of blackhole attacks in wireless sensor networks -- Detection of online fake news using N-gram analysis and machine learning techniques -- Security protocol of social payment apps -- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF -- Infant monitoring system using wearable sensors based on blood oxygen saturation -- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection.
Record Nr. UNISA-996465329203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings / / edited by Issa Traore, Isaac Woungang, Ahmed Awad
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXII, 183 p. 68 illus.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer communication systems
Application software
Software engineering
User interfaces (Computer systems)
Personal computers
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
User Interfaces and Human Computer Interaction
Personal Computing
ISBN 3-319-69155-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Holistic model for HTTP botnet detection based on DNS traffic analysis -- Detecting broad length algorithmically generated domains -- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology -- Detecting command and control channel of botnets in clouds -- An experimental framework for investigating security and privacy of IoT devices -- Dynamic cypher for enhanced cryptography and communication for Internet of Things -- An inter-device authentication scheme for smart homes using one-time-password over infrared channel -- Detection and prevention of blackhole attacks in wireless sensor networks -- Detection of online fake news using N-gram analysis and machine learning techniques -- Security protocol of social payment apps -- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF -- Infant monitoring system using wearable sensors based on blood oxygen saturation -- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection.
Record Nr. UNINA-9910484483503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui