Risks and Security of Internet and Systems: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers: Lecture Notes in Computer Science, cartea 11391
Editat de Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppensen Limba Engleză Paperback – 25 ian 2019
The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1053.72 lei
- 20% Preț: 337.82 lei
- 20% Preț: 339.43 lei
- 20% Preț: 449.99 lei
- 20% Preț: 238.01 lei
- 20% Preț: 337.82 lei
- 20% Preț: 438.69 lei
- Preț: 446.28 lei
- 20% Preț: 341.10 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 640.52 lei
- 17% Preț: 427.22 lei
- 20% Preț: 650.20 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1067.33 lei
- 20% Preț: 587.17 lei
- Preț: 378.43 lei
- 20% Preț: 334.54 lei
- 15% Preț: 435.36 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1404.34 lei
- 20% Preț: 1016.88 lei
- 20% Preț: 575.04 lei
- 20% Preț: 575.48 lei
- 20% Preț: 579.12 lei
- 20% Preț: 757.61 lei
- 15% Preț: 576.20 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 350.92 lei
- 20% Preț: 581.57 lei
- Preț: 407.85 lei
- 20% Preț: 592.06 lei
- 20% Preț: 757.61 lei
- 20% Preț: 819.86 lei
- 20% Preț: 649.49 lei
- 20% Preț: 347.62 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 327.66 lei
Preț vechi: 409.58 lei
-20% Nou
Puncte Express: 491
Preț estimativ în valută:
62.75€ • 64.65$ • 52.57£
62.75€ • 64.65$ • 52.57£
Carte tipărită la comandă
Livrare economică 24 februarie-10 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030121426
ISBN-10: 3030121429
Pagini: 226
Ilustrații: X, 237 p. 112 illus., 35 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Cham, Switzerland
ISBN-10: 3030121429
Pagini: 226
Ilustrații: X, 237 p. 112 illus., 35 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Cham, Switzerland
Cuprins
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.- Are Third-Party Libraries Secure? A Software Library Checker for Java.- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems.- Outsourcing Signatures of Confidential Documents.- Trust evaluation model for attack detection in Social Internet of Things.- A certificate-less key exchange protocol for IoT.- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning.- Privacy Preserving Data Offloading based on Transformation.- DSTC: DNS-based Strict TLS Configurations.- Authenticated Quality of Service Aware Routing in Software Defined Networks.- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).- Enhancing Collaboration between Security Analysts in Security Operations Centers.- RIICS: Risk based IICS segmentation Method.- Effectiveness and Impact measurements of a diversification based Moving Target Defense.- Practical security exploits of the FlexRay in-vehicle communication Protocol.- Connection Dumping Vulnerability Affecting Bluetooth Availability.- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.- Optimal Distribution of Privacy Budget in Differential Privacy.