소장자료
LDR | 04844nam a22006255i 4500 | ||
001 | 0100738075▲ | ||
003 | DE-He213▲ | ||
005 | 20231004172903▲ | ||
007 | cr nn 008mamaa▲ | ||
008 | 211103s2021 sz | s |||| 0|eng d▲ | ||
020 | ▼a9783030900229▼9978-3-030-90022-9▲ | ||
024 | 7 | ▼a10.1007/978-3-030-90022-9▼2doi▲ | |
050 | 4 | ▼aQA76.9.A25▲ | |
082 | 0 | 4 | ▼a005.8▼223▲ |
245 | 1 | 0 | ▼aSecurity and Privacy in Communication Networks▼h[electronic resource] :▼b17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II /▼cedited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.▲ |
250 | ▼a1st ed. 2021.▲ | ||
264 | 1 | ▼aCham :▼bSpringer International Publishing :▼bImprint: Springer,▼c2021.▲ | |
300 | ▼aXVII, 527 p. 138 illus., 96 illus. in color.▼bonline resource.▲ | ||
336 | ▼atext▼btxt▼2rdacontent▲ | ||
337 | ▼acomputer▼bc▼2rdamedia▲ | ||
338 | ▼aonline resource▼bcr▼2rdacarrier▲ | ||
347 | ▼atext file▼bPDF▼2rda▲ | ||
490 | 1 | ▼aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,▼x1867-822X ;▼v399▲ | |
505 | 0 | ▼aAnonymous Short Communications over Social Networks -- A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis -- ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits -- System-Wide Security for Offline Payment Terminals -- Horus: A Security Assessment Framework for Android Crypto Wallets -- Systems Security -- Leakuidator: Leaky resource attacks and countermeasures -- Jabbic lookups: a backend telemetry-based system for malware triage Octavian -- Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution -- Flowrider: Fast On-Demand Key Provisioning for CloudNetworks -- Mobile Security & Privacy -- Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith -- Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy -- HTPD: Secure and Flexible Message-Based Communication for Mobile Apps -- Smartphone Location Spoofing Attack in Wireless Networks -- IoT Security & Privacy 42 Compromised through Compression -- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems.▲ | |
520 | ▼aThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.▲ | ||
650 | 0 | ▼aData protection.▲ | |
650 | 0 | ▼aComputer networks .▲ | |
650 | 0 | ▼aCryptography.▲ | |
650 | 0 | ▼aData encryption (Computer science).▲ | |
650 | 0 | ▼aComputer networks—Security measures.▲ | |
650 | 1 | 4 | ▼aData and Information Security.▲ |
650 | 2 | 4 | ▼aComputer Communication Networks.▲ |
650 | 2 | 4 | ▼aCryptology.▲ |
650 | 2 | 4 | ▼aMobile and Network Security.▲ |
700 | 1 | ▼aGarcia-Alfaro, Joaquin.▼eeditor.▼0(orcid)0000-0002-7453-4393▼1https://orcid.org/0000-0002-7453-4393▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aLi, Shujun.▼eeditor.▼0(orcid)0000-0001-5628-7328▼1https://orcid.org/0000-0001-5628-7328▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aPoovendran, Radha.▼eeditor.▼0(orcid)0000-0003-0269-8097▼1https://orcid.org/0000-0003-0269-8097▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aDebar, Hervé.▼eeditor.▼0(orcid)0000-0002-1344-4167▼1https://orcid.org/0000-0002-1344-4167▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aYung, Moti.▼eeditor.▼0(orcid)0000-0003-0848-0873▼1https://orcid.org/0000-0003-0848-0873▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
710 | 2 | ▼aSpringerLink (Online service)▲ | |
773 | 0 | ▼tSpringer Nature eBook▲ | |
776 | 0 | 8 | ▼iPrinted edition:▼z9783030900212▲ |
776 | 0 | 8 | ▼iPrinted edition:▼z9783030900236▲ |
830 | 0 | ▼aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,▼x1867-822X ;▼v399▲ | |
856 | 4 | 0 | ▼uhttps://doi.org/10.1007/978-3-030-90022-9▲ |

Security and Privacy in Communication Networks[electronic resource] : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II
자료유형
국외eBook
서명/책임사항
Security and Privacy in Communication Networks [electronic resource] : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II / edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung.
판사항
1st ed. 2021.
형태사항
XVII, 527 p. 138 illus., 96 illus. in color. online resource.
총서사항
내용주기
Anonymous Short Communications over Social Networks -- A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis -- ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits -- System-Wide Security for Offline Payment Terminals -- Horus: A Security Assessment Framework for Android Crypto Wallets -- Systems Security -- Leakuidator: Leaky resource attacks and countermeasures -- Jabbic lookups: a backend telemetry-based system for malware triage Octavian -- Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution -- Flowrider: Fast On-Demand Key Provisioning for CloudNetworks -- Mobile Security & Privacy -- Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith -- Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy -- HTPD: Secure and Flexible Message-Based Communication for Mobile Apps -- Smartphone Location Spoofing Attack in Wireless Networks -- IoT Security & Privacy 42 Compromised through Compression -- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems.
요약주기
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
주제
ISBN
9783030900229
관련 인기대출 도서