Computer network security = 6th inte...
Kotenko, Igor.

FindBook      Google Book      Amazon      博客來     
  • Computer network security = 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Computer network security/ edited by Igor Kotenko, Victor Skormin.
    其他題名: 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings /
    其他作者: Kotenko, Igor.
    出版者: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2012.,
    面頁冊數: xiii, 318 p. :ill., digital ;24 cm.
    內容註: Finding Malware on a Web Scale -- Exposing Security Risks for Commercial Mobile Devices -- From Qualitative to Quantitative Enforcement of Security Policy -- Design and Implementation of a Cloud-Based Assured Information Sharing System -- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries -- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols -- Blind 384-bit Digital Signature Scheme -- RABAC: Role-Centric Attribute-Based Access Control -- Trust-Aware RBAC -- Alternative Mechanisms for Information Security -- Flow Policies by a Three-Valued Analysis -- Towards the Orchestration of Secured Services under Non-disclosure Policies -- An Approach for Network Information Flow Analysis for Systems of Embedded Components -- Individual Countermeasure Selection Based on the Return On Response Investment Index -- Security and Reliability Requirements for Advanced Security Event Management -- Model-Based Security Event Management -- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks -- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation -- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems -- Malware Characterization Using Behavioral Components -- MADAM: A Multi-level Anomaly Detector for Android Malware -- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods -- Configuration-Based Approach to Embedded Device Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling.
    Contained By: Springer eBooks
    標題: Computer security - Fiction. -
    電子資源: http://dx.doi.org/10.1007/978-3-642-33704-8
    ISBN: 9783642337048 (electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9151633 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 I565 2012 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入