Security and Management -

Security and Management

Kevin Daimi, Hamid R. Arabnia (Herausgeber)

Buch | Softcover
396 Seiten
2018
C. S. R. E. A. (Verlag)
978-1-60132-467-2 (ISBN)
107,20 inkl. MwSt
  • Keine Verlagsinformationen verfügbar
  • Artikel merken
Presents the proceedings of the 2017 International Conference on Security and Management (SAM '17).
This volume contains the proceedings of the 2017 International Conference on Security and Management (SAM'17).

Hamid R. Arabnia is Professor, Computer Science; Editor-in-Chief, The Journal of Supercomputing (Springer); Elected Fellow, Int'l Society of Intelligent Biological Medicine (ISIBM); The University of Georgia, Department of Computer Science.

Network Security
A Visual Approach to Data Fusion in Sensor Networks
Protection from Black Hole Attacks in Communication Networks
A Survey on Wireless Security Protocol WPA2
MAC address based Sensor Network Authentication: Survey
Cryptographic Technologies I
Performance Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT Environment
IoT Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight Stream Ciphers
A New Key Management And Authentication Architecture For ZigBee Networks (KAAZ)
Threshold Secret Sharing based on 3D-Cellular Automata
Evaluation of Highly Efficient Scalar Multiplication in Elliptic Curve Cryptography
Security Management + Biometrics + Hardware Security
A Study on Korea's Information Security Management System: An Insider Threat Perspective
NOAH for IoT: Cybersecurity Strategy for Home Applications
Cloud Solution for Management and Security in Temporary Reception Centres
A High-order Masking Approach for CLEFIA Implementation on FPGA and Intel
Security Education
Building a Gh0st Malware Experimentation Environment
Undergraduate Software Engineering Experience Developing an Authentication System
Steganography - Capstone Experience Project
Building a Virtual Enterprise Network Environment for APT Experimentation
Applying Security to Moodle Grades
Analyzing and Improving the NCL Ethical Hacking Lab Exercises
Information Assurance
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity
Backup Monitoring in Large Heterogeneous Business Cloud Computing Environments: A Framework for the Development of a Reliable Automated Process
Efficient Isolation Enabled Role-Based Access Control for Database Systems
Minimal TCB for System-Model Execution
Security Applications
Privacy-Enhanced and Fair Matchmaking System - Applications and Analysis of Protocol, Architecture, and Performance
A Framework for Web Applications Security and Response System
Improved Reversible Data hiding using Mean Values in an Encrypted Image
Using Pattern Filtering to Detect Cross-Site Attacks
Virtual Keyboard Logging Counter-measures using Common Fate's Law
Computer Security I
A Light-weight Method to Send and Receive SMS Messages in an Emulator
Android-App-Dissection on the Wandboard - Automatic Analysis of Malicious Mobile Code
Model for Autonomous Correlation of Intrusion Detection State Variables over Spatial, Temporal, and Ontological Domains
Examining Features for Android Malware Detection
An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
Computer Security II
Using IDS to prevent XSS Attacks
Comparison of SVMs with Radial-Basis function and Polynomial Kernels in Classification of Categories in Intrusion Detection
Formal Specification and Verification of Firewall using TLA+
Probabilistic Deception and Attacker Experimentation
Poster Papers
Dynamic Scalable ECC Scheme and Its Application to Encryption Workflow Design
An Analysis of Intrusion Prevention Data Against HPC Services in KISTI
A Chaining User Authentication with Distributed Clustering in the IoT Environment
Cost Integrated Schemes for Decoy Deployment in Virtualized Cloud Services Protection
Vulnerability Analysis and Attacks on Intel Xeon Phi Coprocessor
Late Papers - Security Management
Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Erscheinungsdatum
Reihe/Serie The 2017 WorldComp International Conference Proceedings
Verlagsort Bogart
Sprache englisch
Maße 203 x 279 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
Technik Nachrichtentechnik
ISBN-10 1-60132-467-7 / 1601324677
ISBN-13 978-1-60132-467-2 / 9781601324672
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00