Cantitate/Preț
Produs

Information Systems Security and Privacy: Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers: Communications in Computer and Information Science, cartea 867

Editat de Paolo Mori, Steven Furnell, Olivier Camp
en Limba Engleză Paperback – 9 iun 2018
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017.
The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (4) 32911 lei  43-57 zile
  Springer International Publishing – 28 iun 2020 33868 lei  22-36 zile
  Springer International Publishing – 18 feb 2017 32911 lei  43-57 zile
  Springer International Publishing – 9 iun 2018 33304 lei  43-57 zile
  Springer International Publishing – 5 iul 2019 33340 lei  43-57 zile

Din seria Communications in Computer and Information Science

Preț: 33304 lei

Preț vechi: 41630 lei
-20% Nou

Puncte Express: 500

Preț estimativ în valută:
6373 6671$ 5273£

Carte tipărită la comandă

Livrare economică 07-21 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319933535
ISBN-10: 3319933531
Pagini: 277
Ilustrații: XII, 295 p. 78 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.44 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Cham, Switzerland

Cuprins

Application Marketplace Malware Detection by User Feedback Analysis.- A System for Detecting Targeted Cyber-attacks Using Attack Patterns.- A Better Understanding of Machine Learning Malware Misclassification.- Situation-aware Access Control for Industrie 4.0.- How to Quantify Graph De-anonymization Risks.- A Security Pattern Classification Based on Data Integration.- Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices.- Effcient Detection of Conicts in Data Sharing Agreements.- On Using Obligations for Usage Control in Joining of Datasets.- Directional Distance-Bounding Identification.- An Information Security Management for Socio-Technical Analysis of System Security.- An Exploration of Some Security Issues Within the BACnet Protocol.- Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors. 

Caracteristici

Includes supplementary material: sn.pub/extras