語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure IT systems = 27th Nordic Conf...
~
Nordic Conference on Secure IT Systems (2022 :)
FindBook
Google Book
Amazon
博客來
Secure IT systems = 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Secure IT systems/ edited by Hans P. Reiser, Marcel Kyas.
其他題名:
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022 : proceedings /
其他作者:
Reiser, Hans P.
團體作者:
Nordic Conference on Secure IT Systems
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xiii, 388 p. :ill., digital ;24 cm.
內容註:
On the Effectiveness of Intersection Attacks in Anonymous Microblogging -- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement -- Location Privacy, 5G AKA, and Enhancements -- Local Differential Privacy for Private Construction of Classification Algorithms -- IMSI Probing: Possibilities and Limitations -- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto: Finding Cryptocurrency Miners on ISP networks -- Detection of Voice Conversion Spoofing Attacks using Voiced Speech -- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries -- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans -- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage -- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models -- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs -- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation -- Malware Analysis with Symbolic Execution and Graph Kernel -- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices -- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data -- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-22295-5
ISBN:
9783031222955
Secure IT systems = 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022 : proceedings /
Secure IT systems
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022 : proceedings /[electronic resource] :edited by Hans P. Reiser, Marcel Kyas. - Cham :Springer International Publishing :2022. - xiii, 388 p. :ill., digital ;24 cm. - Lecture notes in computer science,137000302-9743 ;. - Lecture notes in computer science ;13700..
On the Effectiveness of Intersection Attacks in Anonymous Microblogging -- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement -- Location Privacy, 5G AKA, and Enhancements -- Local Differential Privacy for Private Construction of Classification Algorithms -- IMSI Probing: Possibilities and Limitations -- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto: Finding Cryptocurrency Miners on ISP networks -- Detection of Voice Conversion Spoofing Attacks using Voiced Speech -- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries -- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans -- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage -- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models -- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs -- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation -- Malware Analysis with Symbolic Execution and Graph Kernel -- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices -- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data -- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
ISBN: 9783031222955
Standard No.: 10.1007/978-3-031-22295-5doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Secure IT systems = 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022 : proceedings /
LDR
:03147nmm a2200361 a 4500
001
2306845
003
DE-He213
005
20221223100446.0
006
m d
007
cr nn 008maaau
008
230421s2022 sz s 0 eng d
020
$a
9783031222955
$q
(electronic bk.)
020
$a
9783031222948
$q
(paper)
024
7
$a
10.1007/978-3-031-22295-5
$2
doi
035
$a
978-3-031-22295-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N832 2022
111
2
$a
Nordic Conference on Secure IT Systems
$n
(27th :
$d
2022 :
$c
Reykjavik, Iceland)
$3
3611497
245
1 0
$a
Secure IT systems
$h
[electronic resource] :
$b
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022 : proceedings /
$c
edited by Hans P. Reiser, Marcel Kyas.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xiii, 388 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13700
505
0
$a
On the Effectiveness of Intersection Attacks in Anonymous Microblogging -- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement -- Location Privacy, 5G AKA, and Enhancements -- Local Differential Privacy for Private Construction of Classification Algorithms -- IMSI Probing: Possibilities and Limitations -- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto: Finding Cryptocurrency Miners on ISP networks -- Detection of Voice Conversion Spoofing Attacks using Voiced Speech -- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries -- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans -- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage -- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models -- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs -- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation -- Malware Analysis with Symbolic Execution and Graph Kernel -- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices -- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data -- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
520
$a
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
700
1
$a
Reiser, Hans P.
$3
3409682
700
1
$a
Kyas, Marcel.
$3
3611498
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13700.
$3
3611499
856
4 0
$u
https://doi.org/10.1007/978-3-031-22295-5
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9447805
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入