Information and Communications Security: Lecture Notes in Computer Science, cartea 11999
Editat de Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xuen Limba Engleză Paperback – 18 feb 2020
Din seria Lecture Notes in Computer Science
- 20%
Preț: 733.68 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 449.81 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 850.42 lei - 20%
Preț: 386.08 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 620.33 lei - 20%
Preț: 620.33 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 435.28 lei - 20%
Preț: 748.63 lei - 20%
Preț: 633.70 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 675.83 lei - 20%
Preț: 678.21 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 560.93 lei - 20%
Preț: 556.96 lei - 20%
Preț: 313.10 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 15%
Preț: 558.12 lei - 20%
Preț: 563.29 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 20%
Preț: 562.49 lei - 15%
Preț: 672.87 lei - 20%
Preț: 571.88 lei - 20%
Preț: 478.59 lei - 20%
Preț: 984.64 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei - 20%
Preț: 313.87 lei - 20%
Preț: 314.86 lei - 20%
Preț: 793.92 lei - 18%
Preț: 945.44 lei
Preț: 350.62 lei
Preț vechi: 438.27 lei
-20%
Puncte Express: 526
Preț estimativ în valută:
62.00€ • 71.10$ • 53.58£
62.00€ • 71.10$ • 53.58£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783030415785
ISBN-10: 3030415783
Pagini: 856
Ilustrații: XVII, 833 p. 79 illus.
Dimensiuni: 155 x 235 x 46 mm
Greutate: 1.27 kg
Ediția:1st edition 2020
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030415783
Pagini: 856
Ilustrații: XVII, 833 p. 79 illus.
Dimensiuni: 155 x 235 x 46 mm
Greutate: 1.27 kg
Ediția:1st edition 2020
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Prototype-based malware trafic classification with novelty detection.- Evading API Call Sequence Based Malware Classifiers.- UBER: Combating Sandbox Evasion via User Behavior Emulators.- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems.- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data.- Cloning Vulnerability Detection in Driver Layer of IoT Devices.- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System.- Road Context-aware Intrusion Detection System for Autonomous Cars.- Enterprise Network Security.- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC.- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding.- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode.- Deep Learning-Based Vulnerable Function Detection: A Benchmark.- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging.- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks.- CDAE: Towards Empowering Denoising in Side-Channel Analysis.- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies.- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems.- Provably Secure Group Authentication in the Asynchronous Communication Model.- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities.- A Multi-group Signature Scheme from Lattices.- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.- Using Equivalent Class to Solve Interval Discrete Logarithm Problem.- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes).- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features.- Improved Di erential Attacks on GIFT-64.- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs.- Context-aware IPv6 Address Hopping.- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN.- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels.- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework.- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks.- Capturing the Persistence of Facial Expression Features for Deepfake.- Video Detection.- Differentially Private Frequent Itemset Mining against Incremental Updates.- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing.- Privacy-preserving Decentralised Singular Value Decomposition.- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning.- A Character-Level BiGRU-Attention For Phishing Classification.- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities.- Steganography and Steganalysis.- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals.- Convolutional Neural Network based Side-Channel Attacks with Customized Filters.- DLchain: a Covert Channel over Blockchain based on Dynamic Labels.