Cyber Security of Critical Infrastructures |
Autore | Maglaras Leandros |
Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
Descrizione fisica | 1 electronic resource (316 p.) |
Soggetto topico | Technology: general issues |
Soggetto non controllato |
crypto-ransomware
locker-ransomware static analysis dynamic analysis machine learning assessment framework cybersecurity GDPR PCI-DSS DSPT NISD cyber-ranges security training security modelling serious games dynamic adaptation training programmes computers in education bloom STRIDE smart shipping military VMF hash chain T-OTP lightweight secure hash (LSH) CNR web application security vulnerability analysis security testing static analysis security testing dynamic analysis security testing interactive analysis security testing assessment methodology false positive false negative tools combination deep learning image classification transfer learning industrial control system fine-tuning testbeds cyber ranges cyber exercises education training research lattice cryptography code cryptography post quantum cryptography physical unclonable function public key infrastructure high performance computing malware analysis static malware analysis dynamic malware analysis malware classification random forest support vector machines smart grid risk assessment threat modeling formal verification probabilistic model checking cloud robotics image face recognition deep learning algorithms security encryption algorithms cybercrime Hasse diagram interval-valued complex intuitionistic fuzzy relations interval-valued complex intuitionistic fuzzy sets offensive cybersecurity cyber-attacks scoring model offensive cybersecurity framework |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557336503321 |
Maglaras Leandros
![]() |
||
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Side Channel Attacks |
Autore | Hong Seokhie |
Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
Descrizione fisica | 1 electronic resource (258 p.) |
Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
ISBN | 3-03921-001-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
![]() |
||
MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|