Recent Trends in Computer Networks and Distributed Systems Security : Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings / / edited by Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XX, 564 p. 219 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer networks Data encryption (Computer science) Systems and Data Security Computer Communication Networks Cryptology |
Soggetto genere / forma | Conference papers and proceedings. |
ISBN | 3-642-54525-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and privacy in networked systems -- Multimedia security -- Cryptosystems, algorithms, primitives -- System and network security -- Security in self-organising networks -- Multidisciplinary perspectives in cryptology and information security -- Trust and privacy in cyberspace. |
Record Nr. | UNINA-9910299048103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Computing and Communications [[electronic resource] ] : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (389 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data encryption (Computer science)
Application software Computer communication systems Computer security Computer networks - Security measures Computers Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security Mobile and Network Security Computing Milieux |
ISBN | 981-15-4825-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. |
Record Nr. | UNISA-996465461703316 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (389 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data encryption (Computer science)
Application software Computer communication systems Computer security Computer networks - Security measures Computers Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security Mobile and Network Security Computing Milieux |
ISBN | 981-15-4825-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. |
Record Nr. | UNINA-9910410044903321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Computing and Communications : 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings / / edited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXII, 474 p. 179 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data structures (Computer science) Data encryption (Computer science) Computer communication systems Systems and Data Security Data Structures Cryptology Computer Communication Networks |
ISBN | 981-10-2738-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. . |
Record Nr. | UNINA-9910254987503321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trends and Applications of Serious Gaming and Social Media / / edited by Youngkyun Baek, Ryan Ko, Tim Marsh |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (189 p.) |
Disciplina | 794.81526 |
Collana | Gaming Media and Social Effects |
Soggetto topico |
Computational intelligence
User interfaces (Computer systems) Educational technology Mass media Communication Computational Intelligence User Interfaces and Human Computer Interaction Educational Technology Media Sociology |
ISBN | 981-4560-26-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Future of Serious Games and Immersive Technologies and their Impact on Society -- The road to e-services: online and mobile games as enablers -- Achievement Systems Explained Identifying Triggers within Persuasive Technology and Games For Saving and Money Management -- Malware Analytics for Social Networking -- Serious Games and the Gamification of Mental Health Interventions -- Educational Implications Of Social Network Games -- An Analysis Of A Social Network Game In View Of Consumption Education Class -- Learning subject knowledge and acquiring 21st century skills through game development in the classroom -- Learning with World of Warcraft: A Study with MMORPG Brazilian Players -- Learning through playing in Hong Kong classrooms. |
Record Nr. | UNINA-9910299722203321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|