Information Security Applications: 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11–13, 2021, Revised Selected Papers: Lecture Notes in Computer Science, cartea 13009
Editat de Hyoungshick Kimen Limba Engleză Paperback – 27 oct 2021
The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 390.18 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 461.77 lei - 20%
Preț: 527.36 lei - 20%
Preț: 497.04 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.14 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.06 lei - 20%
Preț: 390.69 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 390.35 lei - 20%
Preț: 391.20 lei - 20%
Preț: 392.64 lei - 20%
Preț: 389.90 lei - 20%
Preț: 639.72 lei - 20%
Preț: 461.65 lei - 20%
Preț: 462.05 lei - 15%
Preț: 388.50 lei - 5%
Preț: 516.27 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 535.77 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 400.17 lei - 20%
Preț: 403.00 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 390.46 lei
Preț vechi: 488.08 lei
-20% Nou
Puncte Express: 586
Preț estimativ în valută:
69.08€ • 80.48$ • 60.33£
69.08€ • 80.48$ • 60.33£
Carte disponibilă
Livrare economică 29 decembrie 25 - 12 ianuarie 26
Livrare express 12-18 decembrie pentru 31.66 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030894313
ISBN-10: 3030894312
Pagini: 291
Ilustrații: XI, 291 p. 78 illus., 46 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.43 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030894312
Pagini: 291
Ilustrații: XI, 291 p. 78 illus., 46 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.43 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.