Aspect-Oriented Security Hardening of UML Design Models / / by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima
| Aspect-Oriented Security Hardening of UML Design Models / / by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima |
| Autore | Mouheb Djedjiga |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (247 p.) |
| Disciplina |
004
005.1 005.8 |
| Soggetto topico |
Software engineering
Computer security Software Engineering Systems and Data Security |
| ISBN | 3-319-16106-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion. |
| Record Nr. | UNINA-9910299245503321 |
Mouheb Djedjiga
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
| Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
| Autore | Alrabaee Saed |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Biometrics (Biology) Computer crimes Security Biometrics Cybercrime |
| ISBN | 3-030-34238-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
| Record Nr. | UNISA-996465453903316 |
Alrabaee Saed
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
| Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
| Autore | Alrabaee Saed |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Biometry Computer crimes Security Biometrics Cybercrime |
| ISBN | 3-030-34238-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
| Record Nr. | UNINA-9910380747403321 |
Alrabaee Saed
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cloud Security Auditing / / by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
| Cloud Security Auditing / / by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
| Autore | Majumdar Suryadipta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (174 pages) |
| Disciplina | 004.6782 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Computer engineering Computer networks Telecommunication Data and Information Security Computer Engineering and Networks Computer Communication Networks Communications Engineering, Networks |
| ISBN | 3-030-23128-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Literature Review -- 3 Auditing Security Compliance of Virtualized Infrastructure -- 4 Auditing Virtual Network Isolation across Cloud Layers -- 5 User-Level Runtime Security Auditing for the Cloud -- 6 Proactive Security Auditing in Clouds -- 7 Runtime Security Policy Enforcement in Clouds -- 8 Conclusion. |
| Record Nr. | UNINA-9910349285903321 |
Majumdar Suryadipta
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security [[electronic resource] ] : 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers / / edited by Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquin Garcia-Alfaro
| Foundations and Practice of Security [[electronic resource] ] : 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers / / edited by Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XI, 317 p. 164 illus., 37 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Computers Software engineering Artificial intelligence Computer programming Programming languages (Electronic computers) Security Information Systems and Communication Service Software Engineering Artificial Intelligence Programming Techniques Programming Languages, Compilers, Interpreters |
| ISBN | 3-030-18419-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mobile security -- Cloud security and big data -- IoT security -- Software security, malware analysis, and vulnerability detection -- Cryptography -- Cyber physical security and hardware security -- Access control. |
| Record Nr. | UNISA-996466209003316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Foundations and Practice of Security : 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers / / edited by Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers / / edited by Nur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XI, 317 p. 164 illus., 37 illus. in color.) |
| Disciplina |
005.82
005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Computer networks Software engineering Artificial intelligence Computer programming Compilers (Computer programs) Data and Information Security Computer Communication Networks Software Engineering Artificial Intelligence Programming Techniques Compilers and Interpreters |
| ISBN | 3-030-18419-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mobile security -- Cloud security and big data -- IoT security -- Software security, malware analysis, and vulnerability detection -- Cryptography -- Cyber physical security and hardware security -- Access control. |
| Record Nr. | UNINA-9910337838503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security [[electronic resource] ] : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers / / edited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood
| Foundations and Practice of Security [[electronic resource] ] : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers / / edited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XIII, 444 p. 134 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Cryptology Systems and Data Security Coding and Information Theory |
| ISBN | 3-319-05302-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope. |
| Record Nr. | UNISA-996203275203316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Foundations and Practice of Security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers / / edited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood
| Foundations and Practice of Security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers / / edited by Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XIII, 444 p. 134 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Coding theory Information theory Cryptology Data and Information Security Coding and Information Theory |
| ISBN | 3-319-05302-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information Flow by Combining Static and Dynamic Analysis -- Fault Injection to Reverse Engineer DES-like Cryptosystems -- Software Camouflage -- Investigation of Parameters Influencing the Success of Optical Fault Attacks -- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework -- Quantitative Evaluation of Enforcement Strategies -- Collusion Resistant Inference Control for Cadastral Databases -- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model -- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations -- Computational Soundness of Symbolic Blind Signatures under Active Attacker -- Improved Davies-Murphys Attack on DES Revisited -- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts -- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs -- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks -- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs -- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation -- Evaluation of Software-Oriented Block Ciphers on Smartphones -- Don’t Push it: Breaking iButton Security -- Discovering Flaws in IDS through Analysis of their Inputs -- On the Reverse Engineering of the Citadel Botnet -- The Carna Botnet Through the Lens of a Network Telescope. |
| Record Nr. | UNINA-9910484580203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Machine Learning for Authorship Attribution and Cyber Forensics [[electronic resource] /] / by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung
| Machine Learning for Authorship Attribution and Cyber Forensics [[electronic resource] /] / by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung |
| Autore | Iqbal Farkhund |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (IX, 158 p. 38 illus., 28 illus. in color.) |
| Disciplina | 363.25028563 |
| Collana | International Series on Computer, Entertainment and Media Technology |
| Soggetto topico |
Data mining
Machine learning Computer crimes Data Mining and Knowledge Discovery Machine Learning Cybercrime |
| ISBN | 3-030-61675-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis - Writeprint Mining For Authorship Attribution -- 6. Authorship Attribution With Few Training Samples -- 7. Authorship Characterization -- 8. Authorship Verification -- 9. Authorship Attribution Using Customized Associative Classification -- 10. Criminal Information Mining -- 11. Artificial Intelligence And Digital Forensics. |
| Record Nr. | UNISA-996418193003316 |
Iqbal Farkhund
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Machine Learning for Authorship Attribution and Cyber Forensics / / by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung
| Machine Learning for Authorship Attribution and Cyber Forensics / / by Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung |
| Autore | Iqbal Farkhund |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (IX, 158 p. 38 illus., 28 illus. in color.) |
| Disciplina | 363.25028563 |
| Collana | International Series on Computer, Entertainment and Media Technology |
| Soggetto topico |
Data mining
Machine learning Computer crimes Data Mining and Knowledge Discovery Machine Learning Cybercrime |
| ISBN | 3-030-61675-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Cybersecurity And Cybercrime Investigation -- 2. Machine Learning Framework For Messaging Forensics -- 3. Header-Level Investigation And Analyzing Network Information -- 4. Authorship Analysis Approaches -- 5. Authorship Analysis - Writeprint Mining For Authorship Attribution -- 6. Authorship Attribution With Few Training Samples -- 7. Authorship Characterization -- 8. Authorship Verification -- 9. Authorship Attribution Using Customized Associative Classification -- 10. Criminal Information Mining -- 11. Artificial Intelligence And Digital Forensics. |
| Record Nr. | UNINA-9910484465603321 |
Iqbal Farkhund
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||