Risks and Security of Internet and Systems: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers: Lecture Notes in Computer Science, cartea 11391
Editat de Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppensen Limba Engleză Paperback – 25 ian 2019
The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
Din seria Lecture Notes in Computer Science
- 20% Preț: 741.34 lei
- 20% Preț: 340.22 lei
- 20% Preț: 343.43 lei
- 20% Preț: 315.18 lei
- 20% Preț: 327.41 lei
- 20% Preț: 1031.06 lei
- 20% Preț: 438.67 lei
- 20% Preț: 315.76 lei
- 20% Preț: 330.61 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 995.03 lei
- 20% Preț: 562.71 lei
- 20% Preț: 237.99 lei
- 20% Preț: 504.57 lei
- 20% Preț: 332.20 lei
- 15% Preț: 563.85 lei
- 20% Preț: 636.26 lei
- 5% Preț: 365.59 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.38 lei
- Preț: 370.38 lei
- 20% Preț: 172.68 lei
- 20% Preț: 315.76 lei
- 20% Preț: 662.78 lei
- 20% Preț: 256.26 lei
- 20% Preț: 440.36 lei
- 20% Preț: 626.79 lei
- 20% Preț: 566.70 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 579.38 lei
- 20% Preț: 301.94 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 330.61 lei
- 20% Preț: 1044.38 lei
- 20% Preț: 574.58 lei
- Preț: 399.17 lei
- 20% Preț: 802.24 lei
- 20% Preț: 569.11 lei
- 20% Preț: 1374.12 lei
- 20% Preț: 333.84 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.97 lei
Preț: 320.69 lei
Preț vechi: 400.86 lei
-20% Nou
Puncte Express: 481
Preț estimativ în valută:
61.38€ • 63.97$ • 51.10£
61.38€ • 63.97$ • 51.10£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030121426
ISBN-10: 3030121429
Pagini: 226
Ilustrații: X, 237 p. 112 illus., 35 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Cham, Switzerland
ISBN-10: 3030121429
Pagini: 226
Ilustrații: X, 237 p. 112 illus., 35 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Cham, Switzerland
Cuprins
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.- Are Third-Party Libraries Secure? A Software Library Checker for Java.- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems.- Outsourcing Signatures of Confidential Documents.- Trust evaluation model for attack detection in Social Internet of Things.- A certificate-less key exchange protocol for IoT.- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning.- Privacy Preserving Data Offloading based on Transformation.- DSTC: DNS-based Strict TLS Configurations.- Authenticated Quality of Service Aware Routing in Software Defined Networks.- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).- Enhancing Collaboration between Security Analysts in Security Operations Centers.- RIICS: Risk based IICS segmentation Method.- Effectiveness and Impact measurements of a diversification based Moving Target Defense.- Practical security exploits of the FlexRay in-vehicle communication Protocol.- Connection Dumping Vulnerability Affecting Bluetooth Availability.- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.- Optimal Distribution of Privacy Budget in Differential Privacy.