Information Security Applications: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11–13, 2021, Revised Selected Papers: Lecture Notes in Computer Science, cartea 13009
Editat de Hyoungshick Kimen Limba Engleză Paperback – 27 oct 2021
The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.14 lei - 20%
Preț: 461.32 lei - 20%
Preț: 460.98 lei - 20%
Preț: 390.41 lei - 20%
Preț: 526.98 lei - 15%
Preț: 388.21 lei - 20%
Preț: 461.21 lei - 20%
Preț: 390.08 lei - 20%
Preț: 496.30 lei - 20%
Preț: 461.21 lei - 20%
Preț: 389.45 lei - 15%
Preț: 461.53 lei - 20%
Preț: 389.63 lei - 20%
Preț: 496.68 lei - 20%
Preț: 461.70 lei - 20%
Preț: 251.97 lei - 20%
Preț: 390.86 lei - 20%
Preț: 532.16 lei - 20%
Preț: 461.52 lei - 20%
Preț: 255.72 lei - 20%
Preț: 498.10 lei - 20%
Preț: 497.19 lei - 20%
Preț: 499.02 lei - 20%
Preț: 389.82 lei - 20%
Preț: 390.92 lei - 20%
Preț: 390.86 lei - 20%
Preț: 390.92 lei - 20%
Preț: 390.08 lei - 20%
Preț: 461.45 lei - 20%
Preț: 392.36 lei - 20%
Preț: 460.75 lei - 20%
Preț: 461.32 lei - 20%
Preț: 389.90 lei - 20%
Preț: 639.26 lei - 20%
Preț: 390.66 lei - 20%
Preț: 391.57 lei - 20%
Preț: 389.57 lei - 20%
Preț: 497.97 lei - 20%
Preț: 462.36 lei - 20%
Preț: 460.67 lei - 20%
Preț: 423.95 lei - 5%
Preț: 515.91 lei - 15%
Preț: 535.55 lei - 20%
Preț: 531.90 lei - 20%
Preț: 403.00 lei - 20%
Preț: 535.41 lei - 20%
Preț: 461.25 lei - 20%
Preț: 498.17 lei - 20%
Preț: 461.52 lei - 20%
Preț: 249.77 lei
Preț: 390.19 lei
Preț vechi: 487.73 lei
-20%
Puncte Express: 585
Preț estimativ în valută:
69.10€ • 80.70$ • 60.03£
69.10€ • 80.70$ • 60.03£
Carte disponibilă
Livrare economică 31 ianuarie-14 februarie
Livrare express 20-24 ianuarie pentru 31.62 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030894313
ISBN-10: 3030894312
Pagini: 291
Ilustrații: XI, 291 p. 78 illus., 46 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.43 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030894312
Pagini: 291
Ilustrații: XI, 291 p. 78 illus., 46 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.43 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.