Risks and Security of Internet and Systems
Springer International Publishing (Verlag)
978-3-319-54875-3 (ISBN)
Protection of Personal Data.- CLiKC: A privacy-mindful approach when sharing data.- Ransomware and the Legacy Crypto API .- Risk and Security Analysis Methodology.- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating.- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams.- Towards the weaving of the characteristics of good security requirements.- Methodology for Security.- Towards Empirical Evaluation of Automated Risk Assessment Methods.- An n-sided polygonal model to calculate the impact of cyber security events.- Security and Formal Methods.- SPTool - equivalence checker for SAND attack trees.- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study.- Network Security.- A Proactive Stateful Firewall for Software Defined Networking.- Protocol Reverse Engineering: Challenges and Obfuscation.- Detection and Monitoring.-Detecting anomalous behavior in DBMS logs.- Online link disclosure strategies for social networks.- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory.- Cryptography.- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.- Improving Side-Channel Attacks against Pairing-Based Cryptography.- A First DFA on PRIDE: from Theory to Practice.
| Erscheinungsdatum | 31.03.2017 |
|---|---|
| Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
| Zusatzinfo | VIII, 239 p. 67 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 385 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Applications • authentication • Computer Architecture • Computer networking and communications • Computer Networks • Computer Science • Computer Security • Computer Systems Organization and Communication Ne • conference proceedings • Data communication systems • data encryption • Elliptic Curve • formal methods • Informatics • Information Retrieval • information systems applications (incl. internet) • Internet Searching • Mathematical theory of computation • Operating Systems • Public Key Cryptography • Research • security • side channel attack • Social Networks • Software engineering • Software Engineering/Programming and Operating Sys • Telecommunication networks • Theory of Computation • verification • wireless networks |
| ISBN-10 | 3-319-54875-1 / 3319548751 |
| ISBN-13 | 978-3-319-54875-3 / 9783319548753 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich