top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber Security of Critical Infrastructures
Cyber Security of Critical Infrastructures
Autore Maglaras Leandros
Pubbl/distr/stampa Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021
Descrizione fisica 1 electronic resource (316 p.)
Soggetto topico Technology: general issues
Soggetto non controllato crypto-ransomware
locker-ransomware
static analysis
dynamic analysis
machine learning
assessment framework
cybersecurity
GDPR
PCI-DSS
DSPT
NISD
cyber-ranges
security training
security modelling
serious games
dynamic adaptation
training programmes
computers in education
bloom
STRIDE
smart shipping
military
VMF
hash chain
T-OTP
lightweight secure hash (LSH)
CNR
web application
security vulnerability
analysis security testing
static analysis security testing
dynamic analysis security testing
interactive analysis security testing
assessment methodology
false positive
false negative
tools combination
deep learning
image classification
transfer learning
industrial control system
fine-tuning
testbeds
cyber ranges
cyber exercises
education
training
research
lattice cryptography
code cryptography
post quantum cryptography
physical unclonable function
public key infrastructure
high performance computing
malware analysis
static malware analysis
dynamic malware analysis
malware classification
random forest
support vector machines
smart grid
risk assessment
threat modeling
formal verification
probabilistic model checking
cloud robotics
image face recognition
deep learning algorithms
security
encryption algorithms
cybercrime
Hasse diagram
interval-valued complex intuitionistic fuzzy relations
interval-valued complex intuitionistic fuzzy sets
offensive cybersecurity
cyber-attacks
scoring model
offensive cybersecurity framework
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910557336503321
Maglaras Leandros  
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Side Channel Attacks
Side Channel Attacks
Autore Hong Seokhie
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (258 p.)
Soggetto non controllato binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
ISBN 3-03921-001-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910346673703321
Hong Seokhie  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui