Cyberspace Safety and Security: Lecture Notes in Computer Science, cartea 8300
Editat de Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajanen Limba Engleză Paperback – 8 noi 2013
Din seria Lecture Notes in Computer Science
- 20%
Preț: 733.68 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 449.81 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 850.42 lei - 20%
Preț: 386.08 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 620.33 lei - 20%
Preț: 620.33 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 435.28 lei - 20%
Preț: 748.63 lei - 20%
Preț: 633.70 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 675.83 lei - 20%
Preț: 678.21 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 560.93 lei - 20%
Preț: 556.96 lei - 20%
Preț: 313.10 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 15%
Preț: 558.12 lei - 20%
Preț: 563.29 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 20%
Preț: 562.49 lei - 15%
Preț: 672.87 lei - 20%
Preț: 571.88 lei - 20%
Preț: 478.59 lei - 20%
Preț: 984.64 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei - 20%
Preț: 313.87 lei - 20%
Preț: 314.86 lei - 20%
Preț: 793.92 lei - 18%
Preț: 945.44 lei
Preț: 332.81 lei
Preț vechi: 416.02 lei
-20%
Puncte Express: 499
Preț estimativ în valută:
58.85€ • 67.48$ • 50.86£
58.85€ • 67.48$ • 50.86£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783319035833
ISBN-10: 3319035835
Pagini: 508
Ilustrații: XXVI, 480 p. 149 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:2013
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3319035835
Pagini: 508
Ilustrații: XXVI, 480 p. 149 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:2013
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
A Crawler Guard for Quickly Blocking Unauthorized Web Robot.- Privacy Preserving for Location-Based Services Using Location Transformation.- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.- Multiple-Bank E-Cash without Random Oracles.- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy.- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures.- Towards a Security-Enhanced Firewall Application for OpenFlow Networks.- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows.- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks.- Alert Correlation Algorithms: A Survey and Taxonomy.- Construction and Verification of Mobile Ad Hoc Network Protocols.- Zero-Day Traffic Identification.- Design and Implementation of a Testbed for the Security Assessment of MANETs.- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.- Anonymous Identity-Based Broadcast Encryption with Adaptive Security.- Hierarchical Identity-Based Signature with Short Public Keys.- PeerViewer: Behavioral Tracking and Classification of P2P Malware.- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification.- Detecting Stepping Stones by Abnormal Causality Probability.- Algebra-Based Behavior Identification of Trojan Horse.- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.- The Hot-Spots Problem in Windows 8 Graphical Password Scheme.- Static Detection of Dangerous Behaviors in Android Apps.- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function.- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.- NetSecRadar: A Visualization System for Network Security Situational Awareness.- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System.- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space.- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux.- Towards an Open Framework Leveraging a Trusted Execution Environment.- Secure Re-publication of Dynamic Big Data.
Caracteristici
Proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013