AISec'15 : proceedings of the 8th ACM Workshop on Artificial Intelligence and Security : October 16, 2015, Denver, Colorado, USA / / Indrajit Ray [and five others], editors |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2015 |
Descrizione fisica | 1 online resource (104 pages) : illustrations |
Disciplina | 006.3015113 |
Collana | ACM international conference proceedings series |
Soggetto topico |
Artificial intelligence
Computer security |
ISBN | 1-4503-3826-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910376542703321 |
New York, NY : , : Association for Computing Machinery, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
From Database to Cyber Security [[electronic resource] ] : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computers and civilization Application software Systems and Data Security Cryptology Computer Communication Networks Computers and Society Information Systems Applications (incl. Internet) |
ISBN | 3-030-04834-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. . |
Record Nr. | UNISA-996466211803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computers and civilization Application software Systems and Data Security Cryptology Computer Communication Networks Computers and Society Information Systems Applications (incl. Internet) |
ISBN | 3-030-04834-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. . |
Record Nr. | UNINA-9910349389203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Industrial Control Systems Security and Resiliency : Practice and Theory / / edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (277 pages) |
Disciplina | 658.478 |
Collana | Advances in Information Security |
Soggetto topico |
Data protection
Computer communication systems Electrical engineering Artificial intelligence Security Computer Communication Networks Communications Engineering, Networks Artificial Intelligence |
ISBN | 3-030-18214-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience. |
Record Nr. | UNINA-9910349285603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems Security [[electronic resource] ] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 544 p. 134 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Computer communication systems Algorithms Management information systems Computer science Systems and Data Security Security Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems |
ISBN | 3-319-49806-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. . |
Record Nr. | UNISA-996465525403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 544 p. 134 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Computer communication systems Algorithms Management information systems Computer science Systems and Data Security Security Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems |
ISBN | 3-319-49806-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. . |
Record Nr. | UNINA-9910483312903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society / / general chairs, Indrajit Ray |
Pubbl/distr/stampa | New York : , : ACM, , 2015 |
Descrizione fisica | 1 online resource (134 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Privacy, Right of Information technology |
ISBN | 1-4503-3820-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Proceedings of the 14th Association for Computing Machinery Workshop on Privacy in the Electronic Society |
Record Nr. | UNINA-9910376559903321 |
New York : , : ACM, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop / / general chair, Indrajit Ray |
Pubbl/distr/stampa | New York : , : ACM, , 2015 |
Descrizione fisica | 1 online resource (78 pages) |
Disciplina | 004 |
Soggetto topico |
Cloud computing - Security measures
Computer networks - Security measures |
ISBN | 1-4503-3825-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the 2015 Association for Computing Machinery Workshop on Cloud Computing Security Workshop
CCS '15 : the 22nd ACM Conference on Computer and Communications Security : Denver, CO, USA, October 12-16, 2015 Cloud Computing Security 2015 : the 22nd Association for Computing Machinery Conference on Computer and Communications Security : Denver, Colorado, United States of America, October 12-16, 2015 |
Record Nr. | UNINA-9910376543603321 |
New York : , : ACM, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Risks and Security of Internet and Systems [[electronic resource] ] : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XI, 275 p. 70 illus.) |
Disciplina | 004.678 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Computer communication systems Management information systems Computer science Software engineering Application software Data encryption (Computer science) Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-17127-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling. |
Record Nr. | UNISA-996208604303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Risks and Security of Internet and Systems : 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers / / edited by Javier Lopez, Indrajit Ray, Bruno Crispo |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XI, 275 p. 70 illus.) |
Disciplina | 004.678 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Computer communication systems Management information systems Computer science Software engineering Application software Data encryption (Computer science) Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-17127-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trust -- Security risks and threats -- Intrusion detection and prevention -- Access control and security modeling. |
Record Nr. | UNINA-9910483268803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|