Cantitate/Preț
Produs

Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers: Lecture Notes in Computer Science, cartea 9572

Editat de Costas Lambrinoudakis, Alban Gabillon
en Limba Engleză Paperback – 3 apr 2016
This book constitutes the thoroughly refereedpost-conference proceedings of the 10th International Conference on Risks andSecurity of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island,Greece, in July 2015.
The 18 full papers presented were selected from 50 submissions.The papers sessions that have covered a broad range of topics: trust and privacyissues, privacy policies and policy based protocols, risk management, riskanalysis and vulnerability assessment, cloud systems and cryptography, andattack and security measures.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33354 lei

Preț vechi: 41693 lei
-20% Nou

Puncte Express: 500

Preț estimativ în valută:
6383 6656$ 5305£

Carte tipărită la comandă

Livrare economică 20 martie-03 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319318103
ISBN-10: 3319318101
Pagini: 307
Ilustrații: X, 307 p. 72 illus.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI

Locul publicării:Cham, Switzerland

Cuprins

Addressing Privacy andTrust Issues in Cultural Heritage Modelling.- An Ontology Regulating PrivacyOriented Access Controls.- A Literature Survey and Classifications on DataDeanonymisation.- Improving Users’ Trust through Friendly Privacy Policies: An EmpiricalStudy.- MPLS Policy Target Recognition Network.- Context aware Intrusion ResponseBased on Argumentation Logic.- Countermeasure Selection Based on the Attack andService Dependency Graphs for Security Incident Management.- Quantitative Risk,Statistical Methods and the Four Quadrants for Information Security.- Exploringa Controls-Based Assessment of Infrastructure Vulnerability.- Quantifying Securityin Web ETL Processes.- A Meta-Model for Assisting a Cloud Forensics Process.- POR-2P:Network Coding-Based POR for Data Provision-Payment System.- A Single KeyScheduling Based Compression Function.- Security Issue of Wireless HART BasedSCADA Systems.- Attack Volume Model: Geometrical Approach and Application.- An IntensiveAnalysis of Security and Privacy Browser Add-Ons.- MBotCS: A mobile Botnet DetectionSystem Based on Machine Learning.- Toward Securing MANET against the EnergyDepletion Attack. 

Caracteristici

Includes supplementary material: sn.pub/extras