Guide to differential privacy modifications : a taxonomy of variants and extensions / / Balázs Pejó and Damien Desfontaines |
Autore | Pejó Balázs |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (91 pages) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer security
Computer security - Data processing |
ISBN | 3-030-96398-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intro -- Preface -- Contents -- 1 Introduction -- References -- 2 Differential Privacy -- 2.1 The Original Version -- 2.2 Dimensions -- 2.3 Properties -- 2.4 Relations Between Definitions -- References -- 3 Quantification of Privacy Loss (Q) -- 3.1 Allowing a Small Probability of Error -- 3.2 Averaging the Privacy Loss -- 3.3 Controlling the Tail Distribution -- 3.4 Extension -- 3.5 Multidimensional Definitions -- References -- 4 Neighborhood Definition (N) -- 4.1 Changing the Sensitive Property -- 4.2 Limiting the Scope of the Definition -- 4.3 Considering Other Types of Input -- 4.4 Extensions -- 4.5 Multidimensional Definitions -- References -- 5 Variation of Privacy Loss (V) -- 5.1 Allocating Different Privacy Levels -- 5.2 Randomizing the Privacy Levels -- 5.3 Multidimensional Definitions -- References -- 6 Background Knowledge (B) -- 6.1 Conditioning on the Sensitive Property -- 6.2 Removing the Effect of Correlations -- 6.3 Multidimensional Definitions -- References -- 7 Change in Formalism (F) -- 7.1 Hypothesis Testing Interpretation -- 7.2 Prior-Posterior Bounds -- 7.3 Comparing Two Posteriors -- 7.4 Multidimensional Definitions -- References -- 8 Knowledge Gain Relativization (R) -- 8.1 Auxiliary Leakage Functions -- 8.2 Zero-knowledge Proofs -- 8.3 Multidimensional Definitions -- References -- 9 Computational Power (C) -- 9.1 Multidimensional Definitions -- References -- 10 Summarizing Table -- 10.1 Proofs of Properties -- References -- 11 Scope and Related Work -- 11.1 Methodology -- 11.2 Out of Scope Definitions -- 11.3 Local Model and Other Contexts -- 11.4 Related Work -- References -- 12 Conclusion. |
Record Nr. | UNINA-9910559383903321 |
Pejó Balázs | ||
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to differential privacy modifications : a taxonomy of variants and extensions / / Balázs Pejó and Damien Desfontaines |
Autore | Pejó Balázs |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (91 pages) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer security
Computer security - Data processing |
ISBN | 3-030-96398-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intro -- Preface -- Contents -- 1 Introduction -- References -- 2 Differential Privacy -- 2.1 The Original Version -- 2.2 Dimensions -- 2.3 Properties -- 2.4 Relations Between Definitions -- References -- 3 Quantification of Privacy Loss (Q) -- 3.1 Allowing a Small Probability of Error -- 3.2 Averaging the Privacy Loss -- 3.3 Controlling the Tail Distribution -- 3.4 Extension -- 3.5 Multidimensional Definitions -- References -- 4 Neighborhood Definition (N) -- 4.1 Changing the Sensitive Property -- 4.2 Limiting the Scope of the Definition -- 4.3 Considering Other Types of Input -- 4.4 Extensions -- 4.5 Multidimensional Definitions -- References -- 5 Variation of Privacy Loss (V) -- 5.1 Allocating Different Privacy Levels -- 5.2 Randomizing the Privacy Levels -- 5.3 Multidimensional Definitions -- References -- 6 Background Knowledge (B) -- 6.1 Conditioning on the Sensitive Property -- 6.2 Removing the Effect of Correlations -- 6.3 Multidimensional Definitions -- References -- 7 Change in Formalism (F) -- 7.1 Hypothesis Testing Interpretation -- 7.2 Prior-Posterior Bounds -- 7.3 Comparing Two Posteriors -- 7.4 Multidimensional Definitions -- References -- 8 Knowledge Gain Relativization (R) -- 8.1 Auxiliary Leakage Functions -- 8.2 Zero-knowledge Proofs -- 8.3 Multidimensional Definitions -- References -- 9 Computational Power (C) -- 9.1 Multidimensional Definitions -- References -- 10 Summarizing Table -- 10.1 Proofs of Properties -- References -- 11 Scope and Related Work -- 11.1 Methodology -- 11.2 Out of Scope Definitions -- 11.3 Local Model and Other Contexts -- 11.4 Related Work -- References -- 12 Conclusion. |
Record Nr. | UNISA-996472066703316 |
Pejó Balázs | ||
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
IT convergence and security : proceedings of ICITCS 2021 / / Hyuncheol Kim, Kuinam J. Kim |
Autore | Kim Hyuncheol |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (184 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Computer security - Data processing
Information technology - Cost effectiveness |
ISBN | 981-16-4118-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910502989403321 |
Kim Hyuncheol | ||
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IT convergence and security : proceedings of ICITCS 2021 / / Hyuncheol Kim, Kuinam J. Kim |
Autore | Kim Hyuncheol |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (184 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Computer security - Data processing
Information technology - Cost effectiveness |
ISBN | 981-16-4118-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464503303316 |
Kim Hyuncheol | ||
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , [2019] |
Descrizione fisica | 1 online resource (365 pages) |
Disciplina | 006.3/1 |
Soggetto topico |
Computer networks - Security measures - Data processing
Computer security - Data processing Machine learning Artificial intelligence |
ISBN |
0-429-99572-5
0-429-50404-7 0-429-99571-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection 12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index |
Record Nr. | UNINA-9910793310903321 |
Boca Raton : , : CRC Press, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , [2019] |
Descrizione fisica | 1 online resource (365 pages) |
Disciplina | 006.3/1 |
Soggetto topico |
Computer networks - Security measures - Data processing
Computer security - Data processing Machine learning Artificial intelligence |
ISBN |
0-429-99572-5
0-429-50404-7 0-429-99571-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection 12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index |
Record Nr. | UNINA-9910799931803321 |
Boca Raton : , : CRC Press, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , [2019] |
Descrizione fisica | 1 online resource (365 pages) |
Disciplina | 006.3/1 |
Soggetto topico |
Computer networks - Security measures - Data processing
Computer security - Data processing Machine learning Artificial intelligence |
ISBN |
0-429-99572-5
0-429-50404-7 0-429-99571-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection 12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index |
Record Nr. | UNINA-9910814465803321 |
Boca Raton : , : CRC Press, , [2019] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Silicon Valley cybersecurity conference : second conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, revised selected papers / / Sang-Yoon Chang [and four others], editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (162 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer security - Data processing |
ISBN | 3-030-96057-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464546603316 |
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Silicon Valley cybersecurity conference : second conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, revised selected papers / / Sang-Yoon Chang [and four others], editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (162 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer security - Data processing |
ISBN | 3-030-96057-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910544875303321 |
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ubiquitous security : Second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022, revised selected papers / / Guojun Wang [and three others] |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (571 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer security - Data processing |
ISBN |
981-9902-72-X
9789819902729 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910672440003321 |
Singapore : , : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|