Secure IT Systems (eBook, PDF)
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings
Redaktion: Reiser, Hans P.; Kyas, Marcel
61,95 €
61,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
61,95 €
Als Download kaufen
61,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
61,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
31 °P sammeln
Secure IT Systems (eBook, PDF)
27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings
Redaktion: Reiser, Hans P.; Kyas, Marcel
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 23.63MB
Andere Kunden interessierten sich auch für
- -23%11Secure IT Systems (eBook, PDF)57,95 €
- Information Security Practice and Experience (eBook, PDF)73,95 €
- Security and Privacy in Communication Networks (eBook, PDF)73,95 €
- Advances in Artificial Intelligence and Security (eBook, PDF)97,95 €
- Security and Privacy in Communication Networks (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Constructive Side-Channel Analysis and Secure Design (eBook, PDF)65,95 €
-
-
-
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 388
- Erscheinungstermin: 1. Januar 2023
- Englisch
- ISBN-13: 9783031222955
- Artikelnr.: 67163420
- Verlag: Springer International Publishing
- Seitenzahl: 388
- Erscheinungstermin: 1. Januar 2023
- Englisch
- ISBN-13: 9783031222955
- Artikelnr.: 67163420
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.