Risks and security of internet and s...
International Conference on Risks and Security of Internet and Systems (2018 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Risks and security of internet and systems = 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Risks and security of internet and systems/ edited by Akka Zemmari ... [et al.].
    Reminder of title: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
    remainder title: CRiSIS 2018
    other author: Zemmari, Akka.
    corporate name: International Conference on Risks and Security of Internet and Systems
    Published: Cham :Springer International Publishing : : 2019.,
    Description: x, 237 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.
    Contained By: Springer eBooks
    Subject: Computer networks - Security measures -
    Online resource: https://doi.org/10.1007/978-3-030-12143-3
    ISBN: 9783030121433
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login