語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Risks and security of internet and s...
~
International Conference on Risks and Security of Internet and Systems (2018 :)
FindBook
Google Book
Amazon
博客來
Risks and security of internet and systems = 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Risks and security of internet and systems/ edited by Akka Zemmari ... [et al.].
其他題名:
13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
其他題名:
CRiSIS 2018
其他作者:
Zemmari, Akka.
團體作者:
International Conference on Risks and Security of Internet and Systems
出版者:
Cham :Springer International Publishing : : 2019.,
面頁冊數:
x, 237 p. :ill. (some col.), digital ;24 cm.
內容註:
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.
Contained By:
Springer eBooks
標題:
Computer networks - Security measures -
電子資源:
https://doi.org/10.1007/978-3-030-12143-3
ISBN:
9783030121433
Risks and security of internet and systems = 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
Risks and security of internet and systems
13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /[electronic resource] :CRiSIS 2018edited by Akka Zemmari ... [et al.]. - Cham :Springer International Publishing :2019. - x, 237 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,113910302-9743 ;. - Lecture notes in computer science ;11391..
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
ISBN: 9783030121433
Standard No.: 10.1007/978-3-030-12143-3doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Risks and security of internet and systems = 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
LDR
:03231nmm a2200373 a 4500
001
2178417
003
DE-He213
005
20190124172254.0
006
m d
007
cr nn 008maaau
008
191122s2019 gw s 0 eng d
020
$a
9783030121433
$q
(electronic bk.)
020
$a
9783030121426
$q
(paper)
024
7
$a
10.1007/978-3-030-12143-3
$2
doi
035
$a
978-3-030-12143-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UMZ
$2
bicssc
072
7
$a
COM051230
$2
bisacsh
072
7
$a
UMZ
$2
thema
072
7
$a
UL
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.I61 2018
111
2
$a
International Conference on Risks and Security of Internet and Systems
$n
(13th :
$d
2018 :
$c
Arcachon, France)
$3
3382613
245
1 0
$a
Risks and security of internet and systems
$h
[electronic resource] :
$b
13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
$c
edited by Akka Zemmari ... [et al.].
246
3
$a
CRiSIS 2018
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
x, 237 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11391
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.
520
$a
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Software Engineering/Programming and Operating Systems.
$3
891214
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Zemmari, Akka.
$3
3382614
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
11391.
$3
3382615
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
3382505
856
4 0
$u
https://doi.org/10.1007/978-3-030-12143-3
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9368274
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入