Computer Network Security [[electronic resource] ] : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
| Computer Network Security [[electronic resource] ] : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIII, 362 p. 141 illus.) |
| Disciplina | 004 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer security
Computer communication systems Computers and civilization Computers Law and legislation Data encryption (Computer science) Computer system failures Systems and Data Security Computer Communication Networks Computers and Society Legal Aspects of Computing Cryptology System Performance and Evaluation |
| ISBN | 3-319-65127-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security. |
| Record Nr. | UNISA-996466200803316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Network Security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
| Computer Network Security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIII, 362 p. 141 illus.) |
| Disciplina | 004 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer security
Computer networks Computers and civilization Computers Law and legislation Data encryption (Computer science) Computer system failures Systems and Data Security Computer Communication Networks Computers and Society Legal Aspects of Computing Cryptology System Performance and Evaluation |
| ISBN | 3-319-65127-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security. |
| Record Nr. | UNINA-9910484987903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Network Security [[electronic resource] ] : 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings / / edited by Igor Kotenko, Victor Skormin
| Computer Network Security [[electronic resource] ] : 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings / / edited by Igor Kotenko, Victor Skormin |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XIV, 319 p. 83 illus.) |
| Disciplina | 005.8 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer security
Computer communication systems Computers and civilization Data encryption (Computer science) Operating systems (Computers) Architecture, Computer Systems and Data Security Computer Communication Networks Computers and Society Cryptology Operating Systems Computer System Implementation |
| ISBN | 3-642-33704-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Finding Malware on a Web Scale. -- Exposing Security Risks for Commercial Mobile Devices -- From Qualitative to Quantitative Enforcement of Security Policy -- Design and Implementation of a Cloud-Based Assured Information Sharing System -- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries -- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols -- Blind 384-bit Digital Signature Scheme -- RABAC: Role-Centric Attribute-Based Access Control -- Trust-Aware RBAC -- Alternative Mechanisms for Information Security -- Flow Policies by a Three-Valued Analysis -- Towards the Orchestration of Secured Services under Non-disclosure Policies -- An Approach for Network Information Flow Analysis for Systems of Embedded Components -- Individual Countermeasure Selection Based on the Return On Response Investment Index -- Security and Reliability Requirements for Advanced Security Event Management -- Model-Based Security Event Management -- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks -- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation -- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems -- Malware Characterization Using Behavioral Components -- MADAM: A Multi-level Anomaly Detector for Android Malware -- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods -- Configuration-Based Approach to Embedded Device Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling. |
| Record Nr. | UNISA-996465639703316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Network Security [[electronic resource] ] : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings / / edited by Igor Kotenko, Victor Skormin
| Computer Network Security [[electronic resource] ] : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings / / edited by Igor Kotenko, Victor Skormin |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (XIII, 345 p. 92 illus.) |
| Disciplina | 005.8 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer communication systems
Computer Communication Networks |
| ISBN | 3-642-14706-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Service Dependencies in Information Systems Security -- Secure Applications without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development -- Cryptography for Network Security: Failures, Successes and Challenges -- Group-Centric Models for Secure and Agile Information Sharing -- Security Modeling and Covert Channels -- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors -- Attack and Defense Modeling with BDMP -- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems -- Problems of Modeling in the Analysis of Covert Channels -- Security Policies and Formal Analysis of Security Properties -- Policy-Based Design and Verification for Mission Assurance -- Using Equivalence Relations for Corrective Enforcement of Security Policies -- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus -- Authentication, Authorization, Access Control and Public Key Cryptography -- Credentials Management for High-Value Transactions -- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks -- Intrusion and Malware Detection -- Intellectual Intrusion Detection with Sequences Alignment Methods -- Symptoms-Based Detection of Bot Processes -- A Comparison of Feature-Selection Methods for Intrusion Detection -- From NLP (Natural Language Processing) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure Multi-Agent System for Multi-Hop Environments -- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security, Security Analysis and Virtualization -- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks -- Predictive Security Analysis for Event-Driven Processes -- Virtual Environment Security Modeling -- Clarifying Integrity Control at the Trusted Information Environment. |
| Record Nr. | UNISA-996466216203316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / / Igor Kotenko, Victor Skormin (eds.)
| Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / / Igor Kotenko, Victor Skormin (eds.) |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, : Springer, 2010 |
| Descrizione fisica | 1 online resource (XIII, 345 p. 92 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
KotenkoIgor
SkorminVictor A. <1946-> |
| Collana |
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Lecture notes in computer science |
| Soggetto topico |
Computer networks - Security measures
Computer networks - Access control |
| ISBN | 3-642-14706-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Service Dependencies in Information Systems Security -- Secure Applications without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development -- Cryptography for Network Security: Failures, Successes and Challenges -- Group-Centric Models for Secure and Agile Information Sharing -- Security Modeling and Covert Channels -- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors -- Attack and Defense Modeling with BDMP -- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems -- Problems of Modeling in the Analysis of Covert Channels -- Security Policies and Formal Analysis of Security Properties -- Policy-Based Design and Verification for Mission Assurance -- Using Equivalence Relations for Corrective Enforcement of Security Policies -- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus -- Authentication, Authorization, Access Control and Public Key Cryptography -- Credentials Management for High-Value Transactions -- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks -- Intrusion and Malware Detection -- Intellectual Intrusion Detection with Sequences Alignment Methods -- Symptoms-Based Detection of Bot Processes -- A Comparison of Feature-Selection Methods for Intrusion Detection -- From NLP (Natural Language Processing) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure Multi-Agent System for Multi-Hop Environments -- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security, Security Analysis and Virtualization -- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks -- Predictive Security Analysis for Event-Driven Processes -- Virtual Environment Security Modeling -- Clarifying Integrity Control at the Trusted Information Environment. |
| Altri titoli varianti | MMM-ACNS 2010 |
| Record Nr. | UNINA-9910484328903321 |
| Berlin, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Network Security [[electronic resource] ] : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings / / edited by Vladimir Gorodetsky, Igor Kotenko, Victor Skormin
| Computer Network Security [[electronic resource] ] : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings / / edited by Vladimir Gorodetsky, Igor Kotenko, Victor Skormin |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
| Descrizione fisica | 1 online resource (XIV, 482 p.) |
| Disciplina | 005.8 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer communication systems
Data encryption (Computer science) Algorithms Management information systems Computer science Computers and civilization Operating systems (Computers) Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Computers and Society Operating Systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Computer Network Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web Surveillance Technique for Private Networks -- A Secure Way to Combine IPsec, NAT & DHCP -- A Generic Model for Analyzing Security Protocols -- Networks, Markov Lie Monoids, and Generalized Entropy -- Trust by Workflow in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management -- Authentication, Authorization and Access Control -- Safety Problems in Access Control with Temporal Constraints -- A Modal Logic for Role-Based Access Control -- Unique User-Generated Digital Pseudonyms -- Information Flow Analysis, Covert Channels and Trust Management -- A Probabilistic Property-Specific Approach to Information Flow -- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata -- Detection of Illegal Information Flow -- Towards More Controllable and Practical Delegation -- Security Policy and Operating System Security -- Policy-Driven Routing Management Using CIM -- Secure Hybrid Operating System “Linux over Fenix” -- A Formal Description of SECIMOS Operating System -- Threat Modeling, Vulnerability Assessment and Network Forensics -- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures -- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle -- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security -- Vulnerabilities Detection in the Configurations of MS Windows Operating System -- Intrusion Detection -- Hybrid Intrusion Detection Model Based on Ordered Sequences -- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems -- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks -- A Formal Immune Network and Its Implementation for On-line Intrusion Detection -- Short Papers -- Foundation for a Time Interval Access Control Model -- Developing an Insider Threat Model Using Functional Decomposition -- An XML-Seamless Policy Based Management Framework -- Statistical Covert Channels Through PROXY Server -- Encoding Private Key in Fingerprint -- A New Scheme for the Location Information Protection in Mobile Communication Environments -- Region Protection/Restoration Scheme in Survivable Networks -- Massive Data Mining for Polymorphic Code Detection -- Key Escrow with Tree-Based Access Structure -- Security Checker Architecture for Policy-Based Security Management -- An Efficient Access Control Model Utilized the Attribute Certificate Structuring -- Secure Protected Password Change Scheme. |
| Record Nr. | UNISA-996465837803316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings / / Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.)
| Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings / / Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.) |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2005 |
| Descrizione fisica | 1 online resource (XIV, 482 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
GorodetskiVladimir I. <1937->
KotenkoIgor SkorminVictor A. <1946-> |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Computer networks - Security measures
Computer networks - Access control |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Computer Network Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web Surveillance Technique for Private Networks -- A Secure Way to Combine IPsec, NAT & DHCP -- A Generic Model for Analyzing Security Protocols -- Networks, Markov Lie Monoids, and Generalized Entropy -- Trust by Workflow in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management -- Authentication, Authorization and Access Control -- Safety Problems in Access Control with Temporal Constraints -- A Modal Logic for Role-Based Access Control -- Unique User-Generated Digital Pseudonyms -- Information Flow Analysis, Covert Channels and Trust Management -- A Probabilistic Property-Specific Approach to Information Flow -- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata -- Detection of Illegal Information Flow -- Towards More Controllable and Practical Delegation -- Security Policy and Operating System Security -- Policy-Driven Routing Management Using CIM -- Secure Hybrid Operating System “Linux over Fenix” -- A Formal Description of SECIMOS Operating System -- Threat Modeling, Vulnerability Assessment and Network Forensics -- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures -- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle -- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security -- Vulnerabilities Detection in the Configurations of MS Windows Operating System -- Intrusion Detection -- Hybrid Intrusion Detection Model Based on Ordered Sequences -- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems -- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks -- A Formal Immune Network and Its Implementation for On-line Intrusion Detection -- Short Papers -- Foundation for a Time Interval Access Control Model -- Developing an Insider Threat Model Using Functional Decomposition -- An XML-Seamless Policy Based Management Framework -- Statistical Covert Channels Through PROXY Server -- Encoding Private Key in Fingerprint -- A New Scheme for the Location Information Protection in Mobile Communication Environments -- Region Protection/Restoration Scheme in Survivable Networks -- Massive Data Mining for Polymorphic Code Detection -- Key Escrow with Tree-Based Access Structure -- Security Checker Architecture for Policy-Based Security Management -- An Efficient Access Control Model Utilized the Attribute Certificate Structuring -- Secure Protected Password Change Scheme. |
| Altri titoli varianti |
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS 2005 |
| Record Nr. | UNINA-9910484246003321 |
| Berlin ; ; New York, : Springer, c2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Intelligent Distributed Computing XIII / / edited by Igor Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic
| Intelligent Distributed Computing XIII / / edited by Igor Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXV, 555 p. 213 illus., 98 illus. in color.) |
| Disciplina |
004.36
004.6 |
| Collana | Studies in Computational Intelligence |
| Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
| ISBN | 3-030-32258-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Using Blockchain for Reputation-based Cooperation in IoT -- Design of Fail-Safe Quadrocopter Configuration -- CAAVI-RICS Model for Observing the Security of Fog Computing Systems -- Conceptual Model of Digital Platform for Enterprises of Industry 5.0 -- Conceptual data modeling using aggregates to ensure large-scale distributed systems data security -- Smart Topic Sharing in IoT platform based on a social inspired Broker. |
| Record Nr. | UNINA-9910483190303321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / / edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko
| Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / / edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (X, 181 p. 146 illus., 75 illus. in color.) |
| Disciplina | 787.61 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection
Computer networks Artificial intelligence Data and Information Security Computer Communication Networks Artificial Intelligence |
| ISBN | 981-13-3732-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications. |
| Record Nr. | UNINA-9910350236703321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers / / edited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko
| Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers / / edited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (X, 175 p. 90 illus.) |
| Disciplina | 004.67 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data protection
Electronic digital computers - Evaluation Data and Information Security System Performance and Evaluation |
| ISBN | 981-10-7850-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Performance on clustering routing for naturally deployed wireless sensor networks -- Mobile security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection model for wireless sensor networks -- Building a frame-based cyber security learning game -- personal identification using time and frequency domain features of ECG lead-I -- A secure color-code key exchange protocol for mobile chat application -- Design and implement SPEEX speech technology on ARM processor -- A discrete wavelet transformation based fast and secure transmission of images for group communication -- An automated graph based approach to risk assessment for computer networks with mobile components -- Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion -- The cryptanalysis of WPA & WPA2 Using the parallel-computing with GPUs -- A policy management system based on multi-dimensional attribution label -- Access controlfor cross-border transfer of sensor data -- Security analysis oriented physical components modeling in quantum key distribution -- A novel hybrid architecture for high speed regular expression matching. |
| Record Nr. | UNINA-9910299288003321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||