top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and Communications Security [[electronic resource] ] : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
Information and Communications Security [[electronic resource] ] : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVII, 833 p. 279 illus., 167 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data structures (Computer science)
Data protection
Computer communication systems
Application software
Computers
Computers - Law and legislation
Software engineering
Data Structures and Information Theory
Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Legal Aspects of Computing
Software Engineering/Programming and Operating Systems
ISBN 3-030-41579-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Prototype-based malware traffic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulfHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Selcuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order -- Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectoral Boolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Differential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels – Cloud CoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preserving Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters – DL chain: a Covert Channel over Blockchain based on Dynamic Labels.
Record Nr. UNISA-996418208503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
Information and Communications Security : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVII, 833 p. 279 illus., 167 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data structures (Computer science)
Information theory
Data protection
Computer networks
Application software
Computers - Law and legislation
Information technology - Law and legislation
Software engineering
Data Structures and Information Theory
Data and Information Security
Computer Communication Networks
Computer and Information Systems Applications
Legal Aspects of Computing
Software Engineering
ISBN 3-030-41579-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels.
Record Nr. UNINA-9910380748503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Network and System Security [[electronic resource] ] : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 492 p. 167 illus., 117 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Law and legislation
Computer organization
Application software
Software engineering
Artificial intelligence
Systems and Data Security
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Artificial Intelligence
ISBN 3-030-02744-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Record Nr. UNISA-996466321903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 492 p. 167 illus., 117 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Law and legislation
Computer organization
Application software
Software engineering
Artificial intelligence
Systems and Data Security
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Artificial Intelligence
ISBN 9783030027445
3030027449
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Record Nr. UNINA-9910349386303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
Pubbl/distr/stampa Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017]
Descrizione fisica 1 online resource (334 pages) : illustrations
Disciplina 005.4/46
Collana CRC Series in Security, Privacy and Trust
Soggetto topico Mobile communication systems - Security measures
Smartphones - Security measures
ISBN 1-315-36964-8
1-4987-3592-4
1-315-35263-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security.
Record Nr. UNINA-9910153184703321
Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks : 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I / / edited by Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au
Security and Privacy in Communication Networks : 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I / / edited by Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au
Autore Duan Haixin
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (543 pages)
Disciplina 005.8
Altri autori (Persone) DebbabiMourad
de Carné de CarnavaletXavier
LuoXiapu
DuXiaojiang
AuMan-Ho
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks - Security measures
Data protection
Cryptography
Data encryption (Computer science)
Application software
Mobile and Network Security
Data and Information Security
Cryptology
Security Services
Computer and Information Systems Applications
ISBN 3-031-64948-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AI for Security -- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS -- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification -- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph -- DNN Architecture Attacks via Network and Power Side Channels -- Invisibility Spell Adversarial Patch Attack Against Object Detectors -- Meta Perturbation Generation Network for Text based CAPTCHA -- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks -- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval -- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas -- Authentication -- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density -- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home -- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller -- Blockchain and Distributed System Security -- Byzantine Protocols with Asymptotically Optimal Communication Complexity -- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving -- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography -- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption -- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS -- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage -- Efficient Zero Knowledge for Regular Language -- Enabling Fast Settlement in Atomic Cross-Chain Swaps -- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference -- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching -- Data Security -- An Authentication Algorithm for Sets of Spatial Data Objects -- An Efficient Private Information Retrieval Protocol Based on TFHE -- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries -- Password Cracking by Exploiting User Group Information.
Record Nr. UNINA-9910983327203321
Duan Haixin  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui