top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Guide to differential privacy modifications : a taxonomy of variants and extensions / / Balázs Pejó and Damien Desfontaines
Guide to differential privacy modifications : a taxonomy of variants and extensions / / Balázs Pejó and Damien Desfontaines
Autore Pejó Balázs
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (91 pages)
Disciplina 005.8
Collana SpringerBriefs in Computer Science
Soggetto topico Computer security
Computer security - Data processing
ISBN 3-030-96398-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- 1 Introduction -- References -- 2 Differential Privacy -- 2.1 The Original Version -- 2.2 Dimensions -- 2.3 Properties -- 2.4 Relations Between Definitions -- References -- 3 Quantification of Privacy Loss (Q) -- 3.1 Allowing a Small Probability of Error -- 3.2 Averaging the Privacy Loss -- 3.3 Controlling the Tail Distribution -- 3.4 Extension -- 3.5 Multidimensional Definitions -- References -- 4 Neighborhood Definition (N) -- 4.1 Changing the Sensitive Property -- 4.2 Limiting the Scope of the Definition -- 4.3 Considering Other Types of Input -- 4.4 Extensions -- 4.5 Multidimensional Definitions -- References -- 5 Variation of Privacy Loss (V) -- 5.1 Allocating Different Privacy Levels -- 5.2 Randomizing the Privacy Levels -- 5.3 Multidimensional Definitions -- References -- 6 Background Knowledge (B) -- 6.1 Conditioning on the Sensitive Property -- 6.2 Removing the Effect of Correlations -- 6.3 Multidimensional Definitions -- References -- 7 Change in Formalism (F) -- 7.1 Hypothesis Testing Interpretation -- 7.2 Prior-Posterior Bounds -- 7.3 Comparing Two Posteriors -- 7.4 Multidimensional Definitions -- References -- 8 Knowledge Gain Relativization (R) -- 8.1 Auxiliary Leakage Functions -- 8.2 Zero-knowledge Proofs -- 8.3 Multidimensional Definitions -- References -- 9 Computational Power (C) -- 9.1 Multidimensional Definitions -- References -- 10 Summarizing Table -- 10.1 Proofs of Properties -- References -- 11 Scope and Related Work -- 11.1 Methodology -- 11.2 Out of Scope Definitions -- 11.3 Local Model and Other Contexts -- 11.4 Related Work -- References -- 12 Conclusion.
Record Nr. UNINA-9910559383903321
Pejó Balázs  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to differential privacy modifications : a taxonomy of variants and extensions / / Balázs Pejó and Damien Desfontaines
Guide to differential privacy modifications : a taxonomy of variants and extensions / / Balázs Pejó and Damien Desfontaines
Autore Pejó Balázs
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (91 pages)
Disciplina 005.8
Collana SpringerBriefs in Computer Science
Soggetto topico Computer security
Computer security - Data processing
ISBN 3-030-96398-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- 1 Introduction -- References -- 2 Differential Privacy -- 2.1 The Original Version -- 2.2 Dimensions -- 2.3 Properties -- 2.4 Relations Between Definitions -- References -- 3 Quantification of Privacy Loss (Q) -- 3.1 Allowing a Small Probability of Error -- 3.2 Averaging the Privacy Loss -- 3.3 Controlling the Tail Distribution -- 3.4 Extension -- 3.5 Multidimensional Definitions -- References -- 4 Neighborhood Definition (N) -- 4.1 Changing the Sensitive Property -- 4.2 Limiting the Scope of the Definition -- 4.3 Considering Other Types of Input -- 4.4 Extensions -- 4.5 Multidimensional Definitions -- References -- 5 Variation of Privacy Loss (V) -- 5.1 Allocating Different Privacy Levels -- 5.2 Randomizing the Privacy Levels -- 5.3 Multidimensional Definitions -- References -- 6 Background Knowledge (B) -- 6.1 Conditioning on the Sensitive Property -- 6.2 Removing the Effect of Correlations -- 6.3 Multidimensional Definitions -- References -- 7 Change in Formalism (F) -- 7.1 Hypothesis Testing Interpretation -- 7.2 Prior-Posterior Bounds -- 7.3 Comparing Two Posteriors -- 7.4 Multidimensional Definitions -- References -- 8 Knowledge Gain Relativization (R) -- 8.1 Auxiliary Leakage Functions -- 8.2 Zero-knowledge Proofs -- 8.3 Multidimensional Definitions -- References -- 9 Computational Power (C) -- 9.1 Multidimensional Definitions -- References -- 10 Summarizing Table -- 10.1 Proofs of Properties -- References -- 11 Scope and Related Work -- 11.1 Methodology -- 11.2 Out of Scope Definitions -- 11.3 Local Model and Other Contexts -- 11.4 Related Work -- References -- 12 Conclusion.
Record Nr. UNISA-996472066703316
Pejó Balázs  
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
IT convergence and security : proceedings of ICITCS 2021 / / Hyuncheol Kim, Kuinam J. Kim
IT convergence and security : proceedings of ICITCS 2021 / / Hyuncheol Kim, Kuinam J. Kim
Autore Kim Hyuncheol
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (184 pages)
Disciplina 005.8
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computer security - Data processing
Information technology - Cost effectiveness
ISBN 981-16-4118-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910502989403321
Kim Hyuncheol  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IT convergence and security : proceedings of ICITCS 2021 / / Hyuncheol Kim, Kuinam J. Kim
IT convergence and security : proceedings of ICITCS 2021 / / Hyuncheol Kim, Kuinam J. Kim
Autore Kim Hyuncheol
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (184 pages)
Disciplina 005.8
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computer security - Data processing
Information technology - Cost effectiveness
ISBN 981-16-4118-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464503303316
Kim Hyuncheol  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Pubbl/distr/stampa Boca Raton : , : CRC Press, , [2019]
Descrizione fisica 1 online resource (365 pages)
Disciplina 006.3/1
Soggetto topico Computer networks - Security measures - Data processing
Computer security - Data processing
Machine learning
Artificial intelligence
ISBN 0-429-99572-5
0-429-50404-7
0-429-99571-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Record Nr. UNINA-9910793310903321
Boca Raton : , : CRC Press, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Pubbl/distr/stampa Boca Raton : , : CRC Press, , [2019]
Descrizione fisica 1 online resource (365 pages)
Disciplina 006.3/1
Soggetto topico Computer networks - Security measures - Data processing
Computer security - Data processing
Machine learning
Artificial intelligence
ISBN 0-429-99572-5
0-429-50404-7
0-429-99571-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Record Nr. UNINA-9910799931803321
Boca Raton : , : CRC Press, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng
Pubbl/distr/stampa Boca Raton : , : CRC Press, , [2019]
Descrizione fisica 1 online resource (365 pages)
Disciplina 006.3/1
Soggetto topico Computer networks - Security measures - Data processing
Computer security - Data processing
Machine learning
Artificial intelligence
ISBN 0-429-99572-5
0-429-50404-7
0-429-99571-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection
12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index
Record Nr. UNINA-9910814465803321
Boca Raton : , : CRC Press, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Silicon Valley cybersecurity conference : second conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, revised selected papers / / Sang-Yoon Chang [and four others], editors
Silicon Valley cybersecurity conference : second conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, revised selected papers / / Sang-Yoon Chang [and four others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (162 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer security - Data processing
ISBN 3-030-96057-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464546603316
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Silicon Valley cybersecurity conference : second conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, revised selected papers / / Sang-Yoon Chang [and four others], editors
Silicon Valley cybersecurity conference : second conference, SVCC 2021, San Jose, CA, USA, December 2-3, 2021, revised selected papers / / Sang-Yoon Chang [and four others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (162 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer security - Data processing
ISBN 3-030-96057-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910544875303321
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ubiquitous security : Second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022, revised selected papers / / Guojun Wang [and three others]
Ubiquitous security : Second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022, revised selected papers / / Guojun Wang [and three others]
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 online resource (571 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer security - Data processing
ISBN 981-9902-72-X
9789819902729
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910672440003321
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui