Computer network security = 6th inte...
Kotenko, Igor.

Linked to FindBook      Google Book      Amazon      博客來     
  • Computer network security = 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Computer network security/ edited by Igor Kotenko, Victor Skormin.
    Reminder of title: 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
    other author: Kotenko, Igor.
    Published: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2012.,
    Description: xiii, 318 p. :ill., digital ;24 cm.
    [NT 15003449]: Finding Malware on a Web Scale -- Exposing Security Risks for Commercial Mobile Devices -- From Qualitative to Quantitative Enforcement of Security Policy -- Design and Implementation of a Cloud-Based Assured Information Sharing System -- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries -- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols -- Blind 384-bit Digital Signature Scheme -- RABAC: Role-Centric Attribute-Based Access Control -- Trust-Aware RBAC -- Alternative Mechanisms for Information Security -- Flow Policies by a Three-Valued Analysis -- Towards the Orchestration of Secured Services under Non-disclosure Policies -- An Approach for Network Information Flow Analysis for Systems of Embedded Components -- Individual Countermeasure Selection Based on the Return On Response Investment Index -- Security and Reliability Requirements for Advanced Security Event Management -- Model-Based Security Event Management -- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks -- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation -- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems -- Malware Characterization Using Behavioral Components -- MADAM: A Multi-level Anomaly Detector for Android Malware -- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods -- Configuration-Based Approach to Embedded Device Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling.
    Contained By: Springer eBooks
    Subject: Computer security - Fiction. -
    Online resource: http://dx.doi.org/10.1007/978-3-642-33704-8
    ISBN: 9783642337048 (electronic bk.)
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9151633 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 I565 2012 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login