Secure IT Systems
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30¿December 2, 2022, Proceedings
Herausgegeben:Reiser, Hans P.; Kyas, Marcel
Secure IT Systems
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30¿December 2, 2022, Proceedings
Herausgegeben:Reiser, Hans P.; Kyas, Marcel
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
Andere Kunden interessierten sich auch für
- Information Security Practice and Experience66,99 €
- Secure IT Systems74,89 €
- Security and Privacy in Communication Networks74,99 €
- Advances in Artificial Intelligence and Security95,99 €
- Security and Privacy in Communication Networks37,99 €
- Information Security Applications37,99 €
- Digital Forensics and Cyber Crime63,99 €
-
-
-
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 13700
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-22294-8
- 1st ed. 2022
- Seitenzahl: 404
- Erscheinungstermin: 2. Januar 2023
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 610g
- ISBN-13: 9783031222948
- ISBN-10: 3031222946
- Artikelnr.: 66247827
- Lecture Notes in Computer Science 13700
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-22294-8
- 1st ed. 2022
- Seitenzahl: 404
- Erscheinungstermin: 2. Januar 2023
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 610g
- ISBN-13: 9783031222948
- ISBN-10: 3031222946
- Artikelnr.: 66247827
On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.