Information security applications = ...
WISA (Workshop : Information security) (2021 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security applications = 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security applications/ edited by Hyoungshick Kim.
    Reminder of title: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021 : revised selected papers /
    remainder title: WISA 2021
    other author: Kim, Hyoungshick.
    corporate name: WISA (Workshop : Information security)
    Published: Cham :Springer International Publishing : : 2021.,
    Description: xi, 291 p. :ill. (chiefly col.), digital ;24 cm.
    [NT 15003449]: Machine Learning Security -- LOM: Lightweight classifier for obfuscation methods -- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection -- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks -- On the robustness of intrusion detection systems for vehicles against adversarial attacks -- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems -- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments -- Research on improvement of anomaly detection performance in industrial control systems -- Cryptography -- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem -- Anonymous IBE from PEKS : A Generic Construction -- Secure Computation of Shared Secrets and Its Applications -- Pattern Matching over Encrypted Data with a Short Ciphertext -- Efficient adaptation of TFHE for high end-to-end throughput -- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling -- Hardware Security -- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers -- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor -- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms -- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors -- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks -- Application Security -- Adaptive Network Security Service Orchestraction based on SDN/NFV -- A General Framework for Matching Pattern Hiding in Deep Packet Inspection -- A Privacy-Preserving Payment Model for EV Charging -- Measuring Healthcare Data Breaches -- BadASLR: Exceptional cases of ASLR aiding Exploitation.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-89432-0
    ISBN: 9783030894320
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9410086 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 W57 2021 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login