top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Recent Trends in Computer Networks and Distributed Systems Security : Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings / / edited by Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
Recent Trends in Computer Networks and Distributed Systems Security : Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings / / edited by Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 564 p. 219 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networks
Data encryption (Computer science)
Systems and Data Security
Computer Communication Networks
Cryptology
Soggetto genere / forma Conference papers and proceedings.
ISBN 3-642-54525-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and privacy in networked systems -- Multimedia security -- Cryptosystems, algorithms, primitives -- System and network security -- Security in self-organising networks -- Multidisciplinary perspectives in cryptology and information security -- Trust and privacy in cyberspace.
Record Nr. UNINA-9910299048103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in Computing and Communications [[electronic resource] ] : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat
Security in Computing and Communications [[electronic resource] ] : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (389 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data encryption (Computer science)
Application software
Computer communication systems
Computer security
Computer networks - Security measures
Computers
Cryptology
Information Systems Applications (incl. Internet)
Computer Communication Networks
Systems and Data Security
Mobile and Network Security
Computing Milieux
ISBN 981-15-4825-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange.
Record Nr. UNISA-996465461703316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat
Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers / / edited by Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (389 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data encryption (Computer science)
Application software
Computer communication systems
Computer security
Computer networks - Security measures
Computers
Cryptology
Information Systems Applications (incl. Internet)
Computer Communication Networks
Systems and Data Security
Mobile and Network Security
Computing Milieux
ISBN 981-15-4825-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange.
Record Nr. UNINA-9910410044903321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in Computing and Communications : 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings / / edited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero
Security in Computing and Communications : 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings / / edited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXII, 474 p. 179 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data structures (Computer science)
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Data Structures
Cryptology
Computer Communication Networks
ISBN 981-10-2738-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. .
Record Nr. UNINA-9910254987503321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trends and Applications of Serious Gaming and Social Media / / edited by Youngkyun Baek, Ryan Ko, Tim Marsh
Trends and Applications of Serious Gaming and Social Media / / edited by Youngkyun Baek, Ryan Ko, Tim Marsh
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (189 p.)
Disciplina 794.81526
Collana Gaming Media and Social Effects
Soggetto topico Computational intelligence
User interfaces (Computer systems)
Educational technology
Mass media
Communication
Computational Intelligence
User Interfaces and Human Computer Interaction
Educational Technology
Media Sociology
ISBN 981-4560-26-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Future of Serious Games and Immersive Technologies and their Impact on Society -- The road to e-services: online and mobile games as enablers -- Achievement Systems Explained Identifying Triggers within Persuasive Technology and Games For Saving and Money Management -- Malware Analytics for Social Networking -- Serious Games and the Gamification of Mental Health Interventions -- Educational Implications Of Social Network Games -- An Analysis Of A Social Network Game In View Of Consumption Education Class -- Learning subject knowledge and acquiring 21st century skills through game development in the classroom -- Learning with World of Warcraft: A Study with MMORPG Brazilian Players -- Learning through playing in Hong Kong classrooms.
Record Nr. UNINA-9910299722203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui