top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Network Security [[electronic resource] ] : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
Computer Network Security [[electronic resource] ] : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 362 p. 141 illus.)
Disciplina 004
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer security
Computer communication systems
Computers and civilization
Computers
Law and legislation
Data encryption (Computer science)
Computer system failures
Systems and Data Security
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Cryptology
System Performance and Evaluation
ISBN 3-319-65127-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security.
Record Nr. UNISA-996466200803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Network Security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
Computer Network Security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 362 p. 141 illus.)
Disciplina 004
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer security
Computer networks
Computers and civilization
Computers
Law and legislation
Data encryption (Computer science)
Computer system failures
Systems and Data Security
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Cryptology
System Performance and Evaluation
ISBN 3-319-65127-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security.
Record Nr. UNINA-9910484987903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Network Security [[electronic resource] ] : 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings / / edited by Igor Kotenko, Victor Skormin
Computer Network Security [[electronic resource] ] : 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings / / edited by Igor Kotenko, Victor Skormin
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 319 p. 83 illus.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer security
Computer communication systems
Computers and civilization
Data encryption (Computer science)
Operating systems (Computers)
Architecture, Computer
Systems and Data Security
Computer Communication Networks
Computers and Society
Cryptology
Operating Systems
Computer System Implementation
ISBN 3-642-33704-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finding Malware on a Web Scale. -- Exposing Security Risks for Commercial Mobile Devices -- From Qualitative to Quantitative Enforcement of Security Policy -- Design and Implementation of a Cloud-Based Assured Information Sharing System -- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries -- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols -- Blind 384-bit Digital Signature Scheme -- RABAC: Role-Centric Attribute-Based Access Control -- Trust-Aware RBAC -- Alternative Mechanisms for Information Security -- Flow Policies by a Three-Valued Analysis -- Towards the Orchestration of Secured Services under Non-disclosure Policies -- An Approach for Network Information Flow Analysis for Systems of Embedded Components -- Individual Countermeasure Selection Based on the Return On Response Investment Index -- Security and Reliability Requirements for Advanced Security Event Management -- Model-Based Security Event Management -- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks -- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation -- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems -- Malware Characterization Using Behavioral Components -- MADAM: A Multi-level Anomaly Detector for Android Malware -- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods -- Configuration-Based Approach to Embedded Device Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling.
Record Nr. UNISA-996465639703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Network Security [[electronic resource] ] : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings / / edited by Igor Kotenko, Victor Skormin
Computer Network Security [[electronic resource] ] : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings / / edited by Igor Kotenko, Victor Skormin
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 345 p. 92 illus.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computer Communication Networks
ISBN 3-642-14706-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Service Dependencies in Information Systems Security -- Secure Applications without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development -- Cryptography for Network Security: Failures, Successes and Challenges -- Group-Centric Models for Secure and Agile Information Sharing -- Security Modeling and Covert Channels -- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors -- Attack and Defense Modeling with BDMP -- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems -- Problems of Modeling in the Analysis of Covert Channels -- Security Policies and Formal Analysis of Security Properties -- Policy-Based Design and Verification for Mission Assurance -- Using Equivalence Relations for Corrective Enforcement of Security Policies -- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus -- Authentication, Authorization, Access Control and Public Key Cryptography -- Credentials Management for High-Value Transactions -- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks -- Intrusion and Malware Detection -- Intellectual Intrusion Detection with Sequences Alignment Methods -- Symptoms-Based Detection of Bot Processes -- A Comparison of Feature-Selection Methods for Intrusion Detection -- From NLP (Natural Language Processing) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure Multi-Agent System for Multi-Hop Environments -- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security, Security Analysis and Virtualization -- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks -- Predictive Security Analysis for Event-Driven Processes -- Virtual Environment Security Modeling -- Clarifying Integrity Control at the Trusted Information Environment.
Record Nr. UNISA-996466216203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / / Igor Kotenko, Victor Skormin (eds.)
Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / / Igor Kotenko, Victor Skormin (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 345 p. 92 illus.)
Disciplina 005.8
Altri autori (Persone) KotenkoIgor
SkorminVictor A. <1946->
Collana LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Lecture notes in computer science
Soggetto topico Computer networks - Security measures
Computer networks - Access control
ISBN 3-642-14706-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Service Dependencies in Information Systems Security -- Secure Applications without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development -- Cryptography for Network Security: Failures, Successes and Challenges -- Group-Centric Models for Secure and Agile Information Sharing -- Security Modeling and Covert Channels -- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors -- Attack and Defense Modeling with BDMP -- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems -- Problems of Modeling in the Analysis of Covert Channels -- Security Policies and Formal Analysis of Security Properties -- Policy-Based Design and Verification for Mission Assurance -- Using Equivalence Relations for Corrective Enforcement of Security Policies -- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus -- Authentication, Authorization, Access Control and Public Key Cryptography -- Credentials Management for High-Value Transactions -- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks -- Intrusion and Malware Detection -- Intellectual Intrusion Detection with Sequences Alignment Methods -- Symptoms-Based Detection of Bot Processes -- A Comparison of Feature-Selection Methods for Intrusion Detection -- From NLP (Natural Language Processing) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure Multi-Agent System for Multi-Hop Environments -- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security, Security Analysis and Virtualization -- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks -- Predictive Security Analysis for Event-Driven Processes -- Virtual Environment Security Modeling -- Clarifying Integrity Control at the Trusted Information Environment.
Altri titoli varianti MMM-ACNS 2010
Record Nr. UNINA-9910484328903321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Network Security [[electronic resource] ] : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings / / edited by Vladimir Gorodetsky, Igor Kotenko, Victor Skormin
Computer Network Security [[electronic resource] ] : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings / / edited by Vladimir Gorodetsky, Igor Kotenko, Victor Skormin
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XIV, 482 p.)
Disciplina 005.8
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computers and civilization
Operating systems (Computers)
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computers and Society
Operating Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Computer Network Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web Surveillance Technique for Private Networks -- A Secure Way to Combine IPsec, NAT & DHCP -- A Generic Model for Analyzing Security Protocols -- Networks, Markov Lie Monoids, and Generalized Entropy -- Trust by Workflow in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management -- Authentication, Authorization and Access Control -- Safety Problems in Access Control with Temporal Constraints -- A Modal Logic for Role-Based Access Control -- Unique User-Generated Digital Pseudonyms -- Information Flow Analysis, Covert Channels and Trust Management -- A Probabilistic Property-Specific Approach to Information Flow -- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata -- Detection of Illegal Information Flow -- Towards More Controllable and Practical Delegation -- Security Policy and Operating System Security -- Policy-Driven Routing Management Using CIM -- Secure Hybrid Operating System “Linux over Fenix” -- A Formal Description of SECIMOS Operating System -- Threat Modeling, Vulnerability Assessment and Network Forensics -- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures -- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle -- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security -- Vulnerabilities Detection in the Configurations of MS Windows Operating System -- Intrusion Detection -- Hybrid Intrusion Detection Model Based on Ordered Sequences -- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems -- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks -- A Formal Immune Network and Its Implementation for On-line Intrusion Detection -- Short Papers -- Foundation for a Time Interval Access Control Model -- Developing an Insider Threat Model Using Functional Decomposition -- An XML-Seamless Policy Based Management Framework -- Statistical Covert Channels Through PROXY Server -- Encoding Private Key in Fingerprint -- A New Scheme for the Location Information Protection in Mobile Communication Environments -- Region Protection/Restoration Scheme in Survivable Networks -- Massive Data Mining for Polymorphic Code Detection -- Key Escrow with Tree-Based Access Structure -- Security Checker Architecture for Policy-Based Security Management -- An Efficient Access Control Model Utilized the Attribute Certificate Structuring -- Secure Protected Password Change Scheme.
Record Nr. UNISA-996465837803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings / / Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.)
Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings / / Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2005
Descrizione fisica 1 online resource (XIV, 482 p.)
Disciplina 005.8
Altri autori (Persone) GorodetskiVladimir I. <1937->
KotenkoIgor
SkorminVictor A. <1946->
Collana Lecture notes in computer science
Soggetto topico Computer networks - Security measures
Computer networks - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Computer Network Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web Surveillance Technique for Private Networks -- A Secure Way to Combine IPsec, NAT & DHCP -- A Generic Model for Analyzing Security Protocols -- Networks, Markov Lie Monoids, and Generalized Entropy -- Trust by Workflow in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management -- Authentication, Authorization and Access Control -- Safety Problems in Access Control with Temporal Constraints -- A Modal Logic for Role-Based Access Control -- Unique User-Generated Digital Pseudonyms -- Information Flow Analysis, Covert Channels and Trust Management -- A Probabilistic Property-Specific Approach to Information Flow -- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata -- Detection of Illegal Information Flow -- Towards More Controllable and Practical Delegation -- Security Policy and Operating System Security -- Policy-Driven Routing Management Using CIM -- Secure Hybrid Operating System “Linux over Fenix” -- A Formal Description of SECIMOS Operating System -- Threat Modeling, Vulnerability Assessment and Network Forensics -- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures -- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle -- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security -- Vulnerabilities Detection in the Configurations of MS Windows Operating System -- Intrusion Detection -- Hybrid Intrusion Detection Model Based on Ordered Sequences -- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems -- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks -- A Formal Immune Network and Its Implementation for On-line Intrusion Detection -- Short Papers -- Foundation for a Time Interval Access Control Model -- Developing an Insider Threat Model Using Functional Decomposition -- An XML-Seamless Policy Based Management Framework -- Statistical Covert Channels Through PROXY Server -- Encoding Private Key in Fingerprint -- A New Scheme for the Location Information Protection in Mobile Communication Environments -- Region Protection/Restoration Scheme in Survivable Networks -- Massive Data Mining for Polymorphic Code Detection -- Key Escrow with Tree-Based Access Structure -- Security Checker Architecture for Policy-Based Security Management -- An Efficient Access Control Model Utilized the Attribute Certificate Structuring -- Secure Protected Password Change Scheme.
Altri titoli varianti Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
MMM-ACNS 2005
Record Nr. UNINA-9910484246003321
Berlin ; ; New York, : Springer, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Distributed Computing XIII / / edited by Igor Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic
Intelligent Distributed Computing XIII / / edited by Igor Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXV, 555 p. 213 illus., 98 illus. in color.)
Disciplina 004.36
004.6
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-32258-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Using Blockchain for Reputation-based Cooperation in IoT -- Design of Fail-Safe Quadrocopter Configuration -- CAAVI-RICS Model for Observing the Security of Fog Computing Systems -- Conceptual Model of Digital Platform for Enterprises of Industry 5.0 -- Conceptual data modeling using aggregates to ensure large-scale distributed systems data security -- Smart Topic Sharing in IoT platform based on a social inspired Broker.
Record Nr. UNINA-9910483190303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / / edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko
Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / / edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 181 p. 146 illus., 75 illus. in color.)
Disciplina 787.61
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer networks
Artificial intelligence
Data and Information Security
Computer Communication Networks
Artificial Intelligence
ISBN 981-13-3732-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications.
Record Nr. UNINA-9910350236703321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers / / edited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko
Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers / / edited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 175 p. 90 illus.)
Disciplina 004.67
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Electronic digital computers - Evaluation
Data and Information Security
System Performance and Evaluation
ISBN 981-10-7850-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Performance on clustering routing for naturally deployed wireless sensor networks -- Mobile security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection model for wireless sensor networks -- Building a frame-based cyber security learning game -- personal identification using time and frequency domain features of ECG lead-I -- A secure color-code key exchange protocol for mobile chat application -- Design and implement SPEEX speech technology on ARM processor -- A discrete wavelet transformation based fast and secure transmission of images for group communication -- An automated graph based approach to risk assessment for computer networks with mobile components -- Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion -- The cryptanalysis of WPA & WPA2 Using the parallel-computing with GPUs -- A policy management system based on multi-dimensional attribution label -- Access controlfor cross-border transfer of sensor data -- Security analysis oriented physical components modeling in quantum key distribution -- A novel hybrid architecture for high speed regular expression matching.
Record Nr. UNINA-9910299288003321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui