語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Risks and Security of Internet and S...
~
Yaich, Reda.
Risks and Security of Internet and Systems = 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Risks and Security of Internet and Systems/ edited by Joaquin Garcia-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich.
其他題名:
15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers /
其他作者:
Yaich, Reda.
面頁冊數:
XI, 378 p. 93 illus., 56 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Science, general. -
電子資源:
https://doi.org/10.1007/978-3-030-68887-5
ISBN:
9783030688875
Risks and Security of Internet and Systems = 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers /
Risks and Security of Internet and Systems
15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers /[electronic resource] :edited by Joaquin Garcia-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich. - 1st ed. 2021. - XI, 378 p. 93 illus., 56 illus. in color.online resource. - Information Systems and Applications, incl. Internet/Web, and HCI ;12528. - Information Systems and Applications, incl. Internet/Web, and HCI ;9149.
Keynote Talk -- New Dimensions of Information Warfare: The Economic Pillar — Fintech and Cryptocurrencies -- Vulnerabilities, Attacks and Intrusion Detection -- Measuring and Modeling Software Vulnerability Security Advisory Platforms -- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs -- A Deeper Analysis of Adversarial Examples in Intrusion Detection -- TLS, Openness and Security Control -- Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits -- Security through Transparency and Openness in Computer Design -- An ML Behavior-based Security Control for Smart Home Systems -- Access Control, Risk Assessment and Security Knowledge -- A Posteriori Analysis of Policy Temporal Compliance -- Asset-driven Approach for Security Risk Assessment in IoT Systems -- Heterogeneous security events prioritization using auto-encoders -- Community Knowledge about Security: Identification and Classification of User Contributions -- Risk Analysis, Neural Networks and Web Protection -- Modelling Security Risk Scenarios using Subjective Attack Trees -- Premium Access to Convolutional Neural Networks -- An OWASP Top Ten Driven Survey for Web Application Protection Methods -- Infrastructure Security and Malware Detection -- Autonomous Vehicle Security: Literature Review of Real Attack Experiments -- New Dataset for Industry 4.0 to address the change in threat landscape -- Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning -- Short Papers -- Augmented Voting Reality -- Malicious Http Request Detection using Code-Level Convolutional Neural Network -- Enhancement of a business model with a Business Contextual Risk Model -- Secure Data Processing for Industrial Remote Diagnosis and Maintenance -- Towards Attacker Attribution for Risk Analysis -- Modelling and Verification of Safety of Access Control in SCADA Systems -- Security Assessment and Hardening of Autonomous Vehicles.
This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.
ISBN: 9783030688875
Standard No.: 10.1007/978-3-030-68887-5doiSubjects--Topical Terms:
669807
Computer Science, general.
LC Class. No.: QA75.5-76.95
Dewey Class. No.: 004
Risks and Security of Internet and Systems = 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers /
LDR
:04320nam a22004095i 4500
001
1053171
003
DE-He213
005
20210826194739.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030688875
$9
978-3-030-68887-5
024
7
$a
10.1007/978-3-030-68887-5
$2
doi
035
$a
978-3-030-68887-5
050
4
$a
QA75.5-76.95
072
7
$a
UY
$2
bicssc
072
7
$a
COM014000
$2
bisacsh
072
7
$a
UY
$2
thema
082
0 4
$a
004
$2
23
245
1 0
$a
Risks and Security of Internet and Systems
$h
[electronic resource] :
$b
15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers /
$c
edited by Joaquin Garcia-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XI, 378 p. 93 illus., 56 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
12528
505
0
$a
Keynote Talk -- New Dimensions of Information Warfare: The Economic Pillar — Fintech and Cryptocurrencies -- Vulnerabilities, Attacks and Intrusion Detection -- Measuring and Modeling Software Vulnerability Security Advisory Platforms -- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs -- A Deeper Analysis of Adversarial Examples in Intrusion Detection -- TLS, Openness and Security Control -- Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits -- Security through Transparency and Openness in Computer Design -- An ML Behavior-based Security Control for Smart Home Systems -- Access Control, Risk Assessment and Security Knowledge -- A Posteriori Analysis of Policy Temporal Compliance -- Asset-driven Approach for Security Risk Assessment in IoT Systems -- Heterogeneous security events prioritization using auto-encoders -- Community Knowledge about Security: Identification and Classification of User Contributions -- Risk Analysis, Neural Networks and Web Protection -- Modelling Security Risk Scenarios using Subjective Attack Trees -- Premium Access to Convolutional Neural Networks -- An OWASP Top Ten Driven Survey for Web Application Protection Methods -- Infrastructure Security and Malware Detection -- Autonomous Vehicle Security: Literature Review of Real Attack Experiments -- New Dataset for Industry 4.0 to address the change in threat landscape -- Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning -- Short Papers -- Augmented Voting Reality -- Malicious Http Request Detection using Code-Level Convolutional Neural Network -- Enhancement of a business model with a Business Contextual Risk Model -- Secure Data Processing for Industrial Remote Diagnosis and Maintenance -- Towards Attacker Attribution for Risk Analysis -- Modelling and Verification of Safety of Access Control in SCADA Systems -- Security Assessment and Hardening of Autonomous Vehicles.
520
$a
This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.
650
1 4
$a
Computer Science, general.
$3
669807
650
0
$a
Computer science.
$3
573171
700
1
$a
Yaich, Reda.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1357993
700
1
$a
Cuppens, Nora.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1280263
700
1
$a
Leneutre, Jean.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1357992
700
1
$a
Garcia-Alfaro, Joaquin.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
784619
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030688868
776
0 8
$i
Printed edition:
$z
9783030688882
830
0
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
9149
$3
1253558
856
4 0
$u
https://doi.org/10.1007/978-3-030-68887-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入