top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
AISec'15 : proceedings of the 8th ACM Workshop on Artificial Intelligence and Security : October 16, 2015, Denver, Colorado, USA / / Indrajit Ray [and five others], editors
AISec'15 : proceedings of the 8th ACM Workshop on Artificial Intelligence and Security : October 16, 2015, Denver, Colorado, USA / / Indrajit Ray [and five others], editors
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2015
Descrizione fisica 1 online resource (104 pages) : illustrations
Disciplina 006.3015113
Collana ACM international conference proceedings series
Soggetto topico Artificial intelligence
Computer security
ISBN 1-4503-3826-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910376542703321
New York, NY : , : Association for Computing Machinery, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From Database to Cyber Security [[electronic resource] ] : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
From Database to Cyber Security [[electronic resource] ] : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 3-030-04834-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. .
Record Nr. UNISA-996466211803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 3-030-04834-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. .
Record Nr. UNINA-9910349389203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Industrial Control Systems Security and Resiliency : Practice and Theory / / edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
Industrial Control Systems Security and Resiliency : Practice and Theory / / edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (277 pages)
Disciplina 658.478
Collana Advances in Information Security
Soggetto topico Data protection
Computer communication systems
Electrical engineering
Artificial intelligence
Security
Computer Communication Networks
Communications Engineering, Networks
Artificial Intelligence
ISBN 3-030-18214-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience.
Record Nr. UNINA-9910349285603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
Information Systems Security [[electronic resource] ] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 544 p. 134 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Systems and Data Security
Security
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-319-49806-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. .
Record Nr. UNISA-996465525403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 544 p. 134 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Systems and Data Security
Security
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-319-49806-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. .
Record Nr. UNINA-9910483312903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society / / general chairs, Indrajit Ray
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society / / general chairs, Indrajit Ray
Pubbl/distr/stampa New York : , : ACM, , 2015
Descrizione fisica 1 online resource (134 pages)
Disciplina 005.8
Soggetto topico Computer security
Privacy, Right of
Information technology
ISBN 1-4503-3820-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 14th Association for Computing Machinery Workshop on Privacy in the Electronic Society
Record Nr. UNINA-9910376559903321
New York : , : ACM, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop / / general chair, Indrajit Ray
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop / / general chair, Indrajit Ray
Pubbl/distr/stampa New York : , : ACM, , 2015
Descrizione fisica 1 online resource (78 pages)
Disciplina 004
Soggetto topico Cloud computing - Security measures
Computer networks - Security measures
ISBN 1-4503-3825-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2015 Association for Computing Machinery Workshop on Cloud Computing Security Workshop
CCS '15 : the 22nd ACM Conference on Computer and Communications Security : Denver, CO, USA, October 12-16, 2015
Cloud Computing Security 2015 : the 22nd Association for Computing Machinery Conference on Computer and Communications Security : Denver, Colorado, United States of America, October 12-16, 2015
Record Nr. UNINA-9910376543603321
New York : , : ACM, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Risks and Security of Internet and Systems [[electronic resource] ] : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo
Risks and Security of Internet and Systems [[electronic resource] ] : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XI, 275 p. 70 illus.)
Disciplina 004.678
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Computer communication systems
Management information systems
Computer science
Software engineering
Application software
Data encryption (Computer science)
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
Software Engineering
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-17127-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling.
Record Nr. UNISA-996208604303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Risks and Security of Internet and Systems : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo
Risks and Security of Internet and Systems : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XI, 275 p. 70 illus.)
Disciplina 004.678
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Computer communication systems
Management information systems
Computer science
Software engineering
Application software
Data encryption (Computer science)
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
Software Engineering
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-17127-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling.
Record Nr. UNINA-9910483268803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui