Automated reasoning : 11th International Joint Conference, IJCAR 2022, Haifa, Israel, August 8-10, 2022, Proceedings / / editors, Jasmin Blanchette, Laura Kovács, Dirk Pattinson
| Automated reasoning : 11th International Joint Conference, IJCAR 2022, Haifa, Israel, August 8-10, 2022, Proceedings / / editors, Jasmin Blanchette, Laura Kovács, Dirk Pattinson |
| Autore | Blanchette Jasmin |
| Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (xv, 756 pages) : illustrations (some color) |
| Disciplina | 006.333 |
| Altri autori (Persone) |
BlanchetteJasmin
KovácsLaura PattinsonDirk <1970-> |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Automatic theorem proving
Computer logic |
| Soggetto non controllato |
artificial intelligence
automata theory computer hardware computer networks computer programming computer systems embedded systems formal languages formal logic logic programming network protocols semantics software architecture software design software engineering theoretical computer science |
| ISBN | 3-031-10769-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996483156703316 |
Blanchette Jasmin
|
||
| Cham, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
| Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
| Autore | Lu Wei |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
| Descrizione fisica | 1 electronic resource (239 p.) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
| Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996503561903316 |
Lu Wei
|
||
| Singapore : , : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
| Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
| Autore | Lu Wei |
| Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (234 pages) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering |
| Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| ISBN | 981-16-9229-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464545403316 |
Lu Wei
|
||
| Singapore, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
| Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
| Autore | Lu Wei |
| Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (234 pages) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering Seguretat de les xarxes d'ordinadors Teoria de la codificació |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| ISBN | 981-16-9229-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910522970803321 |
Lu Wei
|
||
| Singapore, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
| Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
| Autore | Lu Wei |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
| Descrizione fisica | 1 electronic resource (239 p.) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security Seguretat de les xarxes d'ordinadors Internet |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910633995903321 |
Lu Wei
|
||
| Singapore, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
| Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
| Autore | Lu Wei |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Springer Nature, 2020 |
| Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
| Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
| ISBN | 981-334-922-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
| Record Nr. | UNISA-996465362903316 |
Lu Wei
|
||
| Springer Nature, 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
| Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
| Autore | Kołodziej Joanna |
| Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
| Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
| Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
| Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
| ISBN | 3-031-04036-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
| Record Nr. | UNISA-996472069303316 |
Kołodziej Joanna
|
||
| Cham, : Springer International Publishing AG, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
| Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings |
| Autore | Krimmer Robert |
| Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (197 pages) |
| Altri autori (Persone) |
VolkamerMelanie
Duenas-CidDavid RønnePeter GermannMicha |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Coding theory & cryptology
Information retrieval Artificial intelligence Network security Computer security Network hardware |
| Soggetto non controllato |
artificial intelligence
communication communication systems computer crime computer hardware computer networks computer science computer security computer systems computer vision cryptography data security engineering fuzzy sets internet network protocols network security privacy signal processing telecommunication systems |
| ISBN | 3-031-15911-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996490356403316 |
Krimmer Robert
|
||
| Cham, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
| Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings |
| Autore | Krimmer Robert |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (197 pages) |
| Disciplina | 324.65 |
| Altri autori (Persone) |
VolkamerMelanie
Duenas-CidDavid RønnePeter GermannMicha |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Coding theory & cryptology
Information retrieval Artificial intelligence Network security Computer security Network hardware Vot electrònic Seguretat informàtica |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| Soggetto non controllato |
artificial intelligence
communication communication systems computer crime computer hardware computer networks computer science computer security computer systems computer vision cryptography data security engineering fuzzy sets internet network protocols network security privacy signal processing telecommunication systems |
| ISBN |
9783031159114
303115911X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- An Analysis of the Security and Privacy Issues of the Neovote Online Voting System -- 1 Introduction -- 2 Legal and Regulatory Constraints in France -- 3 Claims and Transparency -- 4 Code Re-use from Asmcrypto -- 4.1 General Copy -- 4.2 RSAES-PKCS -- 5 Publishing the Tally -- 6 Vote Verification -- 6.1 Availability of the Verification Process -- 6.2 Attacking the Ballot Box -- 6.3 Deanonymising the Votes -- 7 Discussion -- 8 Conclusion -- References -- Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Open Vote Network (OV-Net) -- 2.3 Denial of Service -- 3 Parallel OV-Net -- 4 Parallel OV-Net DoS Resilience -- 5 Tally-Combining Algorithms -- 5.1 Comparing Tally-Combining Algorithms -- 6 Privacy of Parallel OV-Net -- 6.1 Definitions and Assumptions -- 6.2 Basic Cases: M=k=1 and M 1, k=1 -- 6.3 General Case -- 7 Conclusions and Further Research -- References -- Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections -- 1 Introduction -- 2 Background and Related Work -- 3 Research Question and Scope -- 3.1 Vendor Demo Access Requests -- 4 Description of Simply Voting's System -- 4.1 Ballot Casting Process -- 4.2 Potential Side-channel Attacks in the Ballot Casting Process -- 5 Methodology -- 5.1 Testing a Length-Based Side-channel Attack -- 5.2 Technical Implementation of the Client Application -- 5.3 Technical Implementation of the Server Application -- 6 Experiment 1 (Single Contest): Township of Selwyn, Ward Lakefield -- 6.1 Data Collection -- 6.2 Data Analysis -- 7 Additional Experiments -- 7.1 Experiment 2 (Two Contests): Township of Selwyn, Ward Ennismore -- 7.2 Experiment 3 (Three Contests): Town of Ajax, Ward 1 -- 8 Mitigations.
8.1 Client-Side Confirmation Page Generation -- 8.2 Fixed-Length Responses -- 8.3 Uniformly Random-Length Padding in Response Header -- 8.4 Padding from a Gaussian Distribution -- 8.5 Discussion and Conclusion -- References -- Running the Race: A Swiss Voting Story -- 1 Introduction -- 1.1 The Swiss Post Protocol -- 1.2 Outline -- 2 The Requirements -- 2.1 Comments on the Requirements -- 3 The Specification and Proofs -- 3.1 The Protocol Specification is too Narrow -- 3.2 The Roles and Channels are Incompletely Aligned with the VEleS -- 4 The Bugs -- 4.1 Lack of Authentication: Attack on Individual Verifiability -- 4.2 Lack of Details in Handling Inconsistencies: Attack on Individual Verifiability -- 4.3 Lack of ZK Proofs of Correct Key Generation: Attack on Privacy -- 5 Conclusion -- References -- The Effect of Exogenous Shocks on the Administration of Online Voting: Evidence from Ontario, Canada -- 1 Introduction -- 2 Context: Municipal Elections in Canada -- 2.1 The 2018 Technical Incident -- 2.2 The COVID-19 Pandemic -- 3 Literature Review -- 4 Data and Methods -- 5 Results -- 5.1 The 2018 Technical Incident -- 5.2 Do Effects Differ Across Municipal Types? -- 5.3 Open Ended Responses and Focus Group Insights -- 6 Discussion and Concluding Thoughts -- References -- The Council of Europe's CM/Rec(2017)5 on e-voting and Secret Suffrage: Time for yet Another Update? -- 1 Introduction -- 2 The Council of Europe's Rec(2017)5 -- 2.1 The First Council of Europe's Standards on e-voting -- 2.2 The Road Towards Updated Rec(2017)5 -- 3 Secret Suffrage in Rec(2017)5 -- 3.1 Secret Suffrage: Section IV -- 3.2 Beyond Section IV -- 4 Time for yet Another Update? -- 4.1 The Need for a Clearer Scope -- 4.2 The Need for a New Approach -- 4.3 The Need for an Update? -- 5 Conclusions -- References. Sweeter than SUITE: Supermartingale Stratified Union-Intersection Tests of Elections -- 1 Introduction -- 2 Past Work -- 3 Stratified Audits -- 3.1 Assorters and Assertions -- 3.2 Stratified Comparison Audits -- 3.3 Union-intersection Tests -- 3.4 Combining Functions -- 3.5 Intersection Supermartingales -- 3.6 Within-Stratum P-values -- 3.7 Sequential Stratum Selection -- 4 Evaluations -- 4.1 Combination and Allocation Rules -- 4.2 Comparison to SUITE -- 4.3 A Highly Stratified Audit -- 5 Discussion -- A Computational details -- B Data and Code -- References -- They May Look and Look, Yet Not See: BMDs Cannot be Tested Adequately -- 1 Introduction -- 2 Prior Work -- 3 How Much Testing is Enough? -- 3.1 Threats and Defenses -- 3.2 Jurisdiction Sizes, Contest Sizes, and Margins -- 3.3 Voting Transactions -- 4 Passive Testing -- 4.1 Targeting Vulnerable Voters -- 4.2 FUD Attacks on Passive testing -- 5 LAT and Parallel Testing -- 5.1 Lower Bounds on the Difficulty of Parallel Testing -- 5.2 Building a Model of Voter behavior -- 6 Complications -- 7 Conclusion -- References -- Individual Verifiability with Return Codes: Manipulation Detection Efficacy -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Swiss Electronic Voting System -- 3.2 E-Vote-ID-2021-Proposal -- 4 Improvements to E-Vote-ID-2021-Proposal and Descriptive Video -- 4.1 Improvements to the Voting Material and User Interfaces -- 4.2 Descriptive Video -- 5 Methodology -- 5.1 Research Questions, Hypotheses -- 5.2 Considered Manipulation-Types -- 5.3 Study Procedure -- 5.4 Ethics, Data Protection, Recruitment -- 6 Results -- 6.1 Overall Manipulation Detection -- 6.2 Manipulation Detection for Various Subgroups -- 6.3 Video Related Statements -- 7 Discussion -- 8 Conclusion -- References -- Logic and Accuracy Testing: A Fifty-State Review -- 1 Introduction -- 2 Background -- 2.1 L&. A Testing Goals -- 2.2 U.S. Elections -- 2.3 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Evaluation Criteria -- 4 Analysis -- 4.1 Performance by Criterion -- 4.2 Performance by State -- 5 Discussion -- 6 Conclusion -- A State-by-State Practices -- References -- Author Index. |
| Record Nr. | UNINA-9910590067403321 |
Krimmer Robert
|
||
| Cham, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Graph Structures for Knowledge Representation and Reasoning [[electronic resource] ] : 6th International Workshop, GKR 2020, Virtual Event, September 5, 2020, Revised Selected Papers / / edited by Michael Cochez, Madalina Croitoru, Pierre Marquis, Sebastian Rudolph
| Graph Structures for Knowledge Representation and Reasoning [[electronic resource] ] : 6th International Workshop, GKR 2020, Virtual Event, September 5, 2020, Revised Selected Papers / / edited by Michael Cochez, Madalina Croitoru, Pierre Marquis, Sebastian Rudolph |
| Autore | Cochez Michael |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Springer Nature, 2021 |
| Descrizione fisica | 1 online resource (IX, 151 p. 54 illus., 26 illus. in color.) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Artificial Intelligence |
| Soggetto topico |
Artificial intelligence
Application software Computer communication systems Mathematical logic Artificial Intelligence Information Systems Applications (incl. Internet) Computer Communication Networks Mathematical Logic and Formal Languages |
| Soggetto non controllato |
Artificial Intelligence
Information Systems Applications (incl. Internet) Computer Communication Networks Mathematical Logic and Formal Languages Computer and Information Systems Applications Formal Languages and Automata Theory open access concept lattices data mining databases fca formal concept analysis formal languages formal logic information analysis information systems knowledge-based system model-based reasoning network protocols ontologies Information retrieval Internet searching Network hardware Mathematical theory of computation |
| ISBN | 3-030-72308-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Extended Workshop Papers -- Active Semantic Relations in Layered Enterprise Architecture Development -- A Belief Update System Using an Event Model for Location of People in a Smart Home -- A Natural Language Generation Technique for Automated Psychotherapy -- Creative Composition Problem: A Knowledge Graph Logical-based AI Construction and Optimization Solution -- Set Visualisations with Euler and Hasse Diagrams -- Usage Patterns Identification Using Graphs and Machine Learning -- Collaborative Design and Manufacture: Information Structures for Team Formation and Coordination -- Invited Additional Contributions -- Approximate Knowledge Graph Query Answering: From Ranking to Binary Classification -- Galois Connections for Patterns: An Algebra of Labelled Graphs. |
| Record Nr. | UNISA-996464442403316 |
Cochez Michael
|
||
| Springer Nature, 2021 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||