Cyber Security of Critical Infrastructures
| Cyber Security of Critical Infrastructures |
| Autore | Maglaras Leandros |
| Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
| Descrizione fisica | 1 online resource (316 p.) |
| Soggetto topico | Technology: general issues |
| Soggetto non controllato |
analysis security testing
assessment framework assessment methodology bloom cloud robotics CNR code cryptography computers in education crypto-ransomware cyber exercises cyber ranges cyber-attacks cyber-ranges cybercrime cybersecurity deep learning deep learning algorithms DSPT dynamic adaptation dynamic analysis dynamic analysis security testing dynamic malware analysis education encryption algorithms false negative false positive fine-tuning formal verification GDPR hash chain Hasse diagram high performance computing image classification image face recognition industrial control system interactive analysis security testing interval-valued complex intuitionistic fuzzy relations interval-valued complex intuitionistic fuzzy sets lattice cryptography lightweight secure hash (LSH) locker-ransomware machine learning malware analysis malware classification military n/a NISD offensive cybersecurity offensive cybersecurity framework PCI-DSS physical unclonable function post quantum cryptography probabilistic model checking public key infrastructure random forest research risk assessment scoring model security security modelling security training security vulnerability serious games smart grid smart shipping static analysis static analysis security testing static malware analysis STRIDE support vector machines T-OTP testbeds threat modeling tools combination training training programmes transfer learning VMF web application |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910557336503321 |
Maglaras Leandros
|
||
| Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Side Channel Attacks / Seokhie Hong
| Side Channel Attacks / Seokhie Hong |
| Autore | Hong Seokhie |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
| Descrizione fisica | 1 electronic resource (258 p.) |
| Soggetto topico | History of engineering and technology |
| Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
| ISBN |
9783039210015
3039210017 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||