Information Security Applications
Springer International Publishing (Verlag)
978-3-030-89431-3 (ISBN)
Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.
| Erscheinungsdatum | 28.10.2021 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 291 p. 78 illus., 46 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 468 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | AI Security • Applications • authentication • computer crime • Computer Science • conference proceedings • cryptography • Data Security • hardware security • Informatics • Intrusion Detection • IoT security • machine learning • Malware • Network Protocols • Network Security • privacy • Public Key Cryptography • Research • Signal Processing • Software vulnerability |
| ISBN-10 | 3-030-89431-2 / 3030894312 |
| ISBN-13 | 978-3-030-89431-3 / 9783030894313 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich