Secure IT Systems
Springer International Publishing (Verlag)
978-3-031-22294-8 (ISBN)
On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
Erscheinungsdatum | 04.01.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIII, 388 p. 110 illus., 86 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 573 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Attack Detection • Communication Systems • computer crime • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • cryptography • Data communication systems • Data Security • digital forensics • distributed computer systems • Engineering • Formal Security Analysis • Internet • IoT security • malware analysis • Network Protocols • Network Security • privacy • Secure Protocols • side-channel attacks • Signal Processing • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems |
ISBN-10 | 3-031-22294-6 / 3031222946 |
ISBN-13 | 978-3-031-22294-8 / 9783031222948 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich