Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
| Applied Cryptography and Network Security Workshops [[electronic resource] ] : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Machine learning Application software Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Machine Learning Information Systems Applications (incl. Internet) |
| ISBN | 3-030-29729-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. |
| Record Nr. | UNISA-996466435403316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applied Cryptography and Network Security Workshops : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang
| Applied Cryptography and Network Security Workshops : ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Computer networks Computer networks - Security measures Cryptography Data encryption (Computer science) Machine learning Application software Data and Information Security Computer Communication Networks Mobile and Network Security Cryptology Machine Learning Computer and Information Systems Applications |
| ISBN | 3-030-29729-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | SiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. |
| Record Nr. | UNINA-9910349306203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Aspect-Oriented Security Hardening of UML Design Models / / by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima
| Aspect-Oriented Security Hardening of UML Design Models / / by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima |
| Autore | Mouheb Djedjiga |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (247 p.) |
| Disciplina |
004
005.1 005.8 |
| Soggetto topico |
Software engineering
Computer security Software Engineering Systems and Data Security |
| ISBN | 3-319-16106-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion. |
| Record Nr. | UNINA-9910299245503321 |
Mouheb Djedjiga
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
| Binary Code Fingerprinting for Cybersecurity [[electronic resource] ] : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
| Autore | Alrabaee Saed |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Biometrics (Biology) Computer crimes Security Biometrics Cybercrime |
| ISBN | 3-030-34238-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
| Record Nr. | UNISA-996465453903316 |
Alrabaee Saed
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna
| Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting / / by Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna |
| Autore | Alrabaee Saed |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XXI, 247 p. 77 illus., 31 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Biometry Computer crimes Security Biometrics Cybercrime |
| ISBN | 3-030-34238-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Binary Analysis Overview -- 3 Compiler Provenance Attribution -- 4 Library Function Identification -- 5 Identifying Reused Functions in Binary Code -- 6 Function Fingerprinting -- 7 Free Open-Source Software Fingerprinting -- 8 Clone Detection -- 9 Authorship Attribution -- 10 Conclusion. |
| Record Nr. | UNINA-9910380747403321 |
Alrabaee Saed
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cloud Security Auditing / / by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
| Cloud Security Auditing / / by Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
| Autore | Majumdar Suryadipta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (174 pages) |
| Disciplina | 004.6782 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
Computer engineering Computer networks Telecommunication Data and Information Security Computer Engineering and Networks Computer Communication Networks Communications Engineering, Networks |
| ISBN | 3-030-23128-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1 Introduction -- 2 Literature Review -- 3 Auditing Security Compliance of Virtualized Infrastructure -- 4 Auditing Virtual Network Isolation across Cloud Layers -- 5 User-Level Runtime Security Auditing for the Cloud -- 6 Proactive Security Auditing in Clouds -- 7 Runtime Security Policy Enforcement in Clouds -- 8 Conclusion. |
| Record Nr. | UNINA-9910349285903321 |
Majumdar Suryadipta
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data and Applications Security and Privacy XXVII [[electronic resource] ] : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings / / edited by Lingyu Wang, Basit Shafiq
| Data and Applications Security and Privacy XXVII [[electronic resource] ] : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings / / edited by Lingyu Wang, Basit Shafiq |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XIV, 305 p. 71 illus.) |
| Disciplina | 005.8 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Computer security
Computer communication systems Management information systems Computer science Data encryption (Computer science) Application software Data mining Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery |
| ISBN | 3-642-39256-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy -- Access control -- Cloud computing -- Data outsourcing -- Mobile computing. |
| Record Nr. | UNISA-996466255103316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Data and Applications Security and Privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings / / edited by Lingyu Wang, Basit Shafiq
| Data and Applications Security and Privacy XXVII : 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings / / edited by Lingyu Wang, Basit Shafiq |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XIV, 305 p. 71 illus.) |
| Disciplina | 005.8 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Computer security
Computer networks Management information systems Computer science Data encryption (Computer science) Application software Data mining Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery |
| ISBN | 3-642-39256-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy -- Access control -- Cloud computing -- Data outsourcing -- Mobile computing. |
| Record Nr. | UNINA-9910483941603321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security [[electronic resource] ] : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro
| Foundations and Practice of Security [[electronic resource] ] : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIII, 361 p. 83 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Data protection Coding theory Information theory Computer communication systems Biometrics (Biology) Algorithms Cryptology Security Coding and Information Theory Computer Communication Networks Biometrics Algorithm Analysis and Problem Complexity |
| ISBN | 3-319-51966-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security. |
| Record Nr. | UNISA-996466081303316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Foundations and Practice of Security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XIII, 361 p. 83 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Data protection Coding theory Information theory Computer networks Biometry Algorithms Cryptology Security Coding and Information Theory Computer Communication Networks Biometrics Algorithm Analysis and Problem Complexity |
| ISBN | 3-319-51966-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security. |
| Record Nr. | UNINA-9910484048903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||