Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Risks and security of internet and s...
~
(1998 :)
Risks and security of internet and systems13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Risks and security of internet and systemsedited by Akka Zemmari ... [et al.].
Reminder of title:
13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
remainder title:
CRiSIS 2018
other author:
Zemmari, Akka.
corporate name:
Published:
Cham :Springer International Publishing :2019.
Description:
x, 237 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer networksCongresses.Security measures
Online resource:
https://doi.org/10.1007/978-3-030-12143-3
ISBN:
9783030121433$q(electronic bk.)
Risks and security of internet and systems13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
Risks and security of internet and systems
13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /[electronic resource] :CRiSIS 2018edited by Akka Zemmari ... [et al.]. - Cham :Springer International Publishing :2019. - x, 237 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,113910302-9743 ;. - Lecture notes in computer science ;4891..
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
ISBN: 9783030121433$q(electronic bk.)
Standard No.: 10.1007/978-3-030-12143-3doiSubjects--Topical Terms:
384553
Computer networks
--Security measures--Congresses.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Risks and security of internet and systems13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
LDR
:03231nmm a2200373 a 4500
001
555293
003
DE-He213
005
20190124172254.0
006
m d
007
cr nn 008maaau
008
191121s2019 gw s 0 eng d
020
$a
9783030121433$q(electronic bk.)
020
$a
9783030121426$q(paper)
024
7
$a
10.1007/978-3-030-12143-3
$2
doi
035
$a
978-3-030-12143-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UMZ
$2
bicssc
072
7
$a
COM051230
$2
bisacsh
072
7
$a
UMZ
$2
thema
072
7
$a
UL
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.I61 2018
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Risks and security of internet and systems
$h
[electronic resource] :
$b
13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018 : revised selected papers /
$c
edited by Akka Zemmari ... [et al.].
246
3
$a
CRiSIS 2018
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
x, 237 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11391
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams -- Are Third-Party Libraries Secure? A Software Library Checker for Java -- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems -- Outsourcing Signatures of Confidential Documents -- Trust evaluation model for attack detection in Social Internet of Things -- A certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning -- Privacy Preserving Data Offloading based on Transformation -- DSTC: DNS-based Strict TLS Configurations -- Authenticated Quality of Service Aware Routing in Software Defined Networks -- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper) -- Enhancing Collaboration between Security Analysts in Security Operations Centers -- RIICS: Risk based IICS segmentation Method -- Effectiveness and Impact measurements of a diversification based Moving Target Defense -- Practical security exploits of the FlexRay in-vehicle communication Protocol -- Connection Dumping Vulnerability Affecting Bluetooth Availability -- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements -- Optimal Distribution of Privacy Budget in Differential Privacy.
520
$a
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
384606
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
1 4
$a
Software Engineering/Programming and Operating Systems.
$3
273711
650
2 4
$a
Security.
$3
760527
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Artificial Intelligence.
$3
212515
700
1
$a
Zemmari, Akka.
$3
837330
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
822022
856
4 0
$u
https://doi.org/10.1007/978-3-030-12143-3
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000168105
電子館藏
1圖書
電子書
EB TK5105.59 I61 2018 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-12143-3
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login