語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advances in security, networks, and ...
~
SAM (Conference : Computer Security) ((2020 :)
FindBook
Google Book
Amazon
博客來
Advances in security, networks, and Internet of Things = proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advances in security, networks, and Internet of Things/ edited by Kevin Daimi ... [et al.].
其他題名:
proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
其他作者:
Daimi, Kevin.
團體作者:
SAM (Conference : Computer Security)
出版者:
Cham :Springer International Publishing : : 2021.,
面頁冊數:
xxvi, 874 p. :ill., digital ;24 cm.
內容註:
Statistical Analysis of Prime Number Generators Putting Encryption at Risk -- Secure Authentication Protocol for Drones in LTE Networks -- Memorable Password Generation with AES in ECB Mod -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- Suitability of Voice Recognition within the IoT Environment -- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World -- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies -- Phishing Prevention Using Defense in Depth -- Phishing Detection using Deep Learning -- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach -- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack -- Intrusion Detection through Gradient in Digraphs -- A Practice of Detecting Insider Threats within a Network -- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications -- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security -- Enhancing the Cybersecurity Education Curricula Through Quantum Computation -- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program -- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics -- A Posteriori Access Control with an Administrative Policy -- An Analysis of Applying STIR/Shaken to Prevent Robocalls -- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid -- Vulnerability Analysis of 2500 Docker Hub Images -- Analysis of Conpot and its BACnet Features for Cyber-Deception -- Automotive Vehicle Security Metrics -- Requirements for IoT Forensic Models - A Review -- Mobile Malware Forensics Review: Issues and Challenges -- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review -- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach -- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices -- Leveraging Security Management with Low-Level System Monitoring and Visualization -- Lightweight Network Steganography for Distributed Electronic Warfare System Communications -- Security of DBMSs -- Static Analysis for Software Reliability and Security.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-71017-0
ISBN:
9783030710170
Advances in security, networks, and Internet of Things = proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
Advances in security, networks, and Internet of Things
proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /[electronic resource] :edited by Kevin Daimi ... [et al.]. - Cham :Springer International Publishing :2021. - xxvi, 874 p. :ill., digital ;24 cm. - Transactions on computational science and computational intelligence,2569-7072. - Transactions on computational science and computational intelligence..
Statistical Analysis of Prime Number Generators Putting Encryption at Risk -- Secure Authentication Protocol for Drones in LTE Networks -- Memorable Password Generation with AES in ECB Mod -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- Suitability of Voice Recognition within the IoT Environment -- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World -- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies -- Phishing Prevention Using Defense in Depth -- Phishing Detection using Deep Learning -- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach -- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack -- Intrusion Detection through Gradient in Digraphs -- A Practice of Detecting Insider Threats within a Network -- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications -- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security -- Enhancing the Cybersecurity Education Curricula Through Quantum Computation -- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program -- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics -- A Posteriori Access Control with an Administrative Policy -- An Analysis of Applying STIR/Shaken to Prevent Robocalls -- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid -- Vulnerability Analysis of 2500 Docker Hub Images -- Analysis of Conpot and its BACnet Features for Cyber-Deception -- Automotive Vehicle Security Metrics -- Requirements for IoT Forensic Models - A Review -- Mobile Malware Forensics Review: Issues and Challenges -- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review -- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach -- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices -- Leveraging Security Management with Low-Level System Monitoring and Visualization -- Lightweight Network Steganography for Distributed Electronic Warfare System Communications -- Security of DBMSs -- Static Analysis for Software Reliability and Security.
The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20) The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.
ISBN: 9783030710170
Standard No.: 10.1007/978-3-030-71017-0doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advances in security, networks, and Internet of Things = proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
LDR
:04580nmm a2200337 a 4500
001
2244670
003
DE-He213
005
20210710073922.0
006
m d
007
cr nn 008maaau
008
211207s2021 sz s 0 eng d
020
$a
9783030710170
$q
(electronic bk.)
020
$a
9783030710163
$q
(paper)
024
7
$a
10.1007/978-3-030-71017-0
$2
doi
035
$a
978-3-030-71017-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S187 2020
111
2
$a
SAM (Conference : Computer Security)
$d
(2020 :
$c
Las Vegas, Nev. ; Online)
$3
3505734
245
1 0
$a
Advances in security, networks, and Internet of Things
$h
[electronic resource] :
$b
proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 /
$c
edited by Kevin Daimi ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xxvi, 874 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Transactions on computational science and computational intelligence,
$x
2569-7072
505
0
$a
Statistical Analysis of Prime Number Generators Putting Encryption at Risk -- Secure Authentication Protocol for Drones in LTE Networks -- Memorable Password Generation with AES in ECB Mod -- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model -- Suitability of Voice Recognition within the IoT Environment -- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World -- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies -- Phishing Prevention Using Defense in Depth -- Phishing Detection using Deep Learning -- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach -- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack -- Intrusion Detection through Gradient in Digraphs -- A Practice of Detecting Insider Threats within a Network -- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications -- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates' Work Readiness in Cyber Security -- Enhancing the Cybersecurity Education Curricula Through Quantum Computation -- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program -- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics -- A Posteriori Access Control with an Administrative Policy -- An Analysis of Applying STIR/Shaken to Prevent Robocalls -- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid -- Vulnerability Analysis of 2500 Docker Hub Images -- Analysis of Conpot and its BACnet Features for Cyber-Deception -- Automotive Vehicle Security Metrics -- Requirements for IoT Forensic Models - A Review -- Mobile Malware Forensics Review: Issues and Challenges -- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review -- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach -- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices -- Leveraging Security Management with Low-Level System Monitoring and Visualization -- Lightweight Network Steganography for Distributed Electronic Warfare System Communications -- Security of DBMSs -- Static Analysis for Software Reliability and Security.
520
$a
The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20) The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Wireless communication systems
$x
Security measures
$v
Congresses.
$3
855478
650
1 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Circuits and Systems.
$3
896527
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Daimi, Kevin.
$3
3295887
710
2
$a
SpringerLink (Online service)
$3
836513
711
2
$a
ICWN (Conference)
$d
(2020 :
$c
Las Vegas, Nev. ; Online)
$3
3505735
711
2
$a
ICOMP (Conference)
$d
(2020 :
$c
Las Vegas, Nev. ; Online)
$3
3505736
711
2
$a
ESCS (Conference)
$d
(2020 :
$c
Las Vegas, Nev. ; Online)
$3
3505737
773
0
$t
Springer Nature eBook
830
0
$a
Transactions on computational science and computational intelligence.
$3
3227107
856
4 0
$u
https://doi.org/10.1007/978-3-030-71017-0
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9405716
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入