Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers: Lecture Notes in Computer Science, cartea 12056
Editat de Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaroen Limba Engleză Paperback – 3 apr 2020
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 338.68 lei
Preț vechi: 423.35 lei
-20% Nou
Puncte Express: 508
Preț estimativ în valută:
64.82€ • 67.42$ • 54.32£
64.82€ • 67.42$ • 54.32£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030453701
ISBN-10: 3030453707
Pagini: 408
Ilustrații: XIII, 408 p. 153 illus., 68 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030453707
Pagini: 408
Ilustrații: XIII, 408 p. 153 illus., 68 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning Approaches.- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks.- Ransomware Network Traffic Analysis for Pre-Encryption Alert.- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.- Selection and performance analysis of CICIDS2017 features importance.- Semantic Representation Based on Deep Learning for Spam Detection.- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.- Labelled Network Capture Generation For Anomaly Detection.- Attack Prevention and Trustworthiness.- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS.- Secure Logging with Security against Adaptive Crash Attack.- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience.- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.- Protecting Android Apps from Repackaging Using Native Code.- Access Control Models and Cryptography.- Command Dependencies in Heuristic Safety Analysis of Access Control Models.- On Attribute Retrieval in ABAC.- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control.- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.- An Efficient Identification Scheme Based on Rank Metric.- Security Analysis of Auctionity: a blockchain based e-auction.- Dynamic Searchable Encryption with Access Control.- Short Papers.- Get-your-ID: Decentralized Proof of Identity.- Towards secure TMIS protocols.- Detecting Ransomware in Encrypted Web Traffic.- Digital forensics in vessel transportation systems.- A Privacy Protection Layer for Wearable Devices.- Validating the DFA Attack Resistance of AES.- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications.- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History.- Towards Privacy-Aware Smart Surveillance.