語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Foundations and Practice of Security...
~
Barbeau, Michel.
Foundations and Practice of Security = 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Foundations and Practice of Security/ edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro.
其他題名:
12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
其他作者:
Garcia-Alfaro, Joaquin.
面頁冊數:
XIII, 408 p. 153 illus., 68 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-030-45371-8
ISBN:
9783030453718
Foundations and Practice of Security = 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
Foundations and Practice of Security
12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /[electronic resource] :edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro. - 1st ed. 2020. - XIII, 408 p. 153 illus., 68 illus. in color.online resource. - Security and Cryptology ;12056. - Security and Cryptology ;9241.
Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.
ISBN: 9783030453718
Standard No.: 10.1007/978-3-030-45371-8doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Foundations and Practice of Security = 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
LDR
:04081nam a22004215i 4500
001
1027787
003
DE-He213
005
20210209165340.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030453718
$9
978-3-030-45371-8
024
7
$a
10.1007/978-3-030-45371-8
$2
doi
035
$a
978-3-030-45371-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Foundations and Practice of Security
$h
[electronic resource] :
$b
12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
$c
edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XIII, 408 p. 153 illus., 68 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12056
505
0
$a
Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
520
$a
This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computers.
$3
565115
650
0
$a
Computer security.
$3
557122
700
1
$a
Garcia-Alfaro, Joaquin.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
784619
700
1
$a
Laborde, Romain.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1324235
700
1
$a
Gong, Guang.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
785105
700
1
$a
Barbeau, Michel.
$e
editor.
$1
https://orcid.org/0000-0003-3531-4926
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1324234
700
1
$a
Benzekri, Abdelmalek.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1324233
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030453701
776
0 8
$i
Printed edition:
$z
9783030453725
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-45371-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入