Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers: Lecture Notes in Computer Science, cartea 11999
Editat de Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xuen Limba Engleză Paperback – 18 feb 2020
Din seria Lecture Notes in Computer Science
- 20% Preț: 1053.72 lei
- 20% Preț: 337.82 lei
- 20% Preț: 339.43 lei
- 20% Preț: 449.99 lei
- 20% Preț: 238.01 lei
- 20% Preț: 337.82 lei
- 20% Preț: 438.69 lei
- Preț: 446.28 lei
- 20% Preț: 341.10 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 640.52 lei
- 17% Preț: 427.22 lei
- 20% Preț: 650.20 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1067.33 lei
- 20% Preț: 587.17 lei
- Preț: 378.43 lei
- 20% Preț: 334.54 lei
- 15% Preț: 435.36 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1404.34 lei
- 20% Preț: 1016.88 lei
- 20% Preț: 575.04 lei
- 20% Preț: 575.48 lei
- 20% Preț: 579.12 lei
- 20% Preț: 757.61 lei
- 15% Preț: 576.20 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 350.92 lei
- 20% Preț: 581.57 lei
- Preț: 407.85 lei
- 20% Preț: 592.06 lei
- 20% Preț: 757.61 lei
- 20% Preț: 819.86 lei
- 20% Preț: 649.49 lei
- 20% Preț: 347.62 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 357.30 lei
Preț vechi: 446.63 lei
-20% Nou
Puncte Express: 536
Preț estimativ în valută:
68.43€ • 70.50$ • 57.32£
68.43€ • 70.50$ • 57.32£
Carte tipărită la comandă
Livrare economică 24 februarie-10 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030415785
ISBN-10: 3030415783
Pagini: 833
Ilustrații: XVII, 833 p. 79 illus.
Dimensiuni: 155 x 235 mm
Greutate: 1.18 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030415783
Pagini: 833
Ilustrații: XVII, 833 p. 79 illus.
Dimensiuni: 155 x 235 mm
Greutate: 1.18 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Prototype-based malware trafic classification with novelty detection.- Evading API Call Sequence Based Malware Classifiers.- UBER: Combating Sandbox Evasion via User Behavior Emulators.- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems.- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data.- Cloning Vulnerability Detection in Driver Layer of IoT Devices.- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System.- Road Context-aware Intrusion Detection System for Autonomous Cars.- Enterprise Network Security.- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC.- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding.- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode.- Deep Learning-Based Vulnerable Function Detection: A Benchmark.- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging.- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks.- CDAE: Towards Empowering Denoising in Side-Channel Analysis.- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies.- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems.- Provably Secure Group Authentication in the Asynchronous Communication Model.- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities.- A Multi-group Signature Scheme from Lattices.- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.- Using Equivalent Class to Solve Interval Discrete Logarithm Problem.- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes).- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features.- Improved Di erential Attacks on GIFT-64.- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs.- Context-aware IPv6 Address Hopping.- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN.- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels.- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework.- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks.- Capturing the Persistence of Facial Expression Features for Deepfake.- Video Detection.- Differentially Private Frequent Itemset Mining against Incremental Updates.- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing.- Privacy-preserving Decentralised Singular Value Decomposition.- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning.- A Character-Level BiGRU-Attention For Phishing Classification.- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities.- Steganography and Steganalysis.- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals.- Convolutional Neural Network based Side-Channel Attacks with Customized Filters.- DLchain: a Covert Channel over Blockchain based on Dynamic Labels.