Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers: Lecture Notes in Computer Science, cartea 12056
Editat de Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaroen Limba Engleză Paperback – 3 apr 2020
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.42 lei - 20%
Preț: 326.81 lei - 20%
Preț: 391.36 lei - 20%
Preț: 321.68 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 320.72 lei - 20%
Preț: 497.25 lei - 15%
Preț: 496.40 lei - 20%
Preț: 324.19 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 458.84 lei - 20%
Preț: 390.42 lei - 20%
Preț: 270.68 lei - 20%
Preț: 497.75 lei - 20%
Preț: 423.78 lei - 20%
Preț: 322.32 lei - 20%
Preț: 322.09 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 463.03 lei
Preț: 325.79 lei
Preț vechi: 407.24 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.64€ • 67.15$ • 50.34£
57.64€ • 67.15$ • 50.34£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030453701
ISBN-10: 3030453707
Pagini: 408
Ilustrații: XIII, 408 p. 153 illus., 68 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030453707
Pagini: 408
Ilustrații: XIII, 408 p. 153 illus., 68 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning Approaches.- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks.- Ransomware Network Traffic Analysis for Pre-Encryption Alert.- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles.- Selection and performance analysis of CICIDS2017 features importance.- Semantic Representation Based on Deep Learning for Spam Detection.- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis.- Labelled Network Capture Generation For Anomaly Detection.- Attack Prevention and Trustworthiness.- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS.- Secure Logging with Security against Adaptive Crash Attack.- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience.- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE.- Protecting Android Apps from Repackaging Using Native Code.- Access Control Models and Cryptography.- Command Dependencies in Heuristic Safety Analysis of Access Control Models.- On Attribute Retrieval in ABAC.- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control.- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.- An Efficient Identification Scheme Based on Rank Metric.- Security Analysis of Auctionity: a blockchain based e-auction.- Dynamic Searchable Encryption with Access Control.- Short Papers.- Get-your-ID: Decentralized Proof of Identity.- Towards secure TMIS protocols.- Detecting Ransomware in Encrypted Web Traffic.- Digital forensics in vessel transportation systems.- A Privacy Protection Layer for Wearable Devices.- Validating the DFA Attack Resistance of AES.- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications.- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History.- Towards Privacy-Aware Smart Surveillance.