Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers: Lecture Notes in Computer Science, cartea 12056
Editat de Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaroen Limba Engleză Paperback – 3 apr 2020
Din seria Lecture Notes in Computer Science
- 20% Preț: 1021.30 lei
- 20% Preț: 337.03 lei
- 20% Preț: 340.22 lei
- 20% Preț: 256.27 lei
- 20% Preț: 324.32 lei
- 20% Preț: 438.69 lei
- 20% Preț: 315.78 lei
- 20% Preț: 327.52 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 557.41 lei
- 20% Preț: 561.37 lei
- 15% Preț: 558.56 lei
- 20% Preț: 238.01 lei
- 20% Preț: 504.57 lei
- 20% Preț: 329.09 lei
- 20% Preț: 563.75 lei
- 20% Preț: 630.24 lei
- 20% Preț: 321.96 lei
- 20% Preț: 1361.10 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.39 lei
- Preț: 366.90 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.19 lei
- 20% Preț: 985.59 lei
- 20% Preț: 620.87 lei
- 20% Preț: 436.22 lei
- 20% Preț: 734.34 lei
- 20% Preț: 1034.49 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 573.92 lei
- 20% Preț: 301.95 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 327.52 lei
- 20% Preț: 794.65 lei
- 20% Preț: 569.16 lei
- Preț: 395.43 lei
- 20% Preț: 1138.26 lei
- 20% Preț: 734.34 lei
- 20% Preț: 315.78 lei
- 20% Preț: 330.70 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.98 lei
Preț: 325.94 lei
Preț vechi: 407.42 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
62.38€ • 65.81$ • 51.99£
62.38€ • 65.81$ • 51.99£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030453701
ISBN-10: 3030453707
Pagini: 408
Ilustrații: XIII, 408 p. 153 illus., 68 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030453707
Pagini: 408
Ilustrații: XIII, 408 p. 153 illus., 68 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning Approaches.- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks.- Ransomware Network Traffic Analysis for Pre-Encryption Alert.- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.- Selection and performance analysis of CICIDS2017 features importance.- Semantic Representation Based on Deep Learning for Spam Detection.- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.- Labelled Network Capture Generation For Anomaly Detection.- Attack Prevention and Trustworthiness.- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS.- Secure Logging with Security against Adaptive Crash Attack.- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience.- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.- Protecting Android Apps from Repackaging Using Native Code.- Access Control Models and Cryptography.- Command Dependencies in Heuristic Safety Analysis of Access Control Models.- On Attribute Retrieval in ABAC.- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control.- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.- An Efficient Identification Scheme Based on Rank Metric.- Security Analysis of Auctionity: a blockchain based e-auction.- Dynamic Searchable Encryption with Access Control.- Short Papers.- Get-your-ID: Decentralized Proof of Identity.- Towards secure TMIS protocols.- Detecting Ransomware in Encrypted Web Traffic.- Digital forensics in vessel transportation systems.- A Privacy Protection Layer for Wearable Devices.- Validating the DFA Attack Resistance of AES.- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications.- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History.- Towards Privacy-Aware Smart Surveillance.