Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
ICT systems security and privacy pro...
~
(1998 :)
ICT systems security and privacy protection36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
ICT systems security and privacy protectionedited by Audun Josang, Lynn Futcher, Janne Hagen.
Reminder of title:
36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021 : proceedings /
remainder title:
SEC 2021
other author:
Josang, Audun.
corporate name:
Published:
Cham :Springer International Publishing :2021.
Description:
xv, 448 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Computer securityCongresses.
Online resource:
https://doi.org/10.1007/978-3-030-78120-0
ISBN:
9783030781200$q(electronic bk.)
ICT systems security and privacy protection36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021 : proceedings /
ICT systems security and privacy protection
36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021 : proceedings /[electronic resource] :SEC 2021edited by Audun Josang, Lynn Futcher, Janne Hagen. - Cham :Springer International Publishing :2021. - xv, 448 p. :ill. (some col.), digital ;24 cm. - IFIP advances in information and communication technology,6251868-4238 ;. - IFIP advances in information and communication technology ;370..
Digital Signatures -- XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany -- Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials -- SIUV: A Smart car Identity management and Usage control system based on Verifiable credentials -- Vulnerability Management -- A Performance Assessment of Free-to-use Vulnerability Scanners - Revisited -- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection -- Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware -- Covert Channels and Cryptography -- ESQABE: Predicting Encrypted Search Queries -- Reconnection-based Covert Channels in Wireless Networks -- Minecraft Altered Skin Channel (MASC) -- Lattice-based weak curve fault attack on ECDSA -- Application and System Security -- HyperSec: Visual Analytics for blockchain security monitoring -- 100 Popular Open-Source Infosec Tools -- RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators -- Privacy -- Accept All: The Landscape of Cookie Banners in Greece & the UK -- The AppChk Crowd-Sourcing Platform: Which third parties are iOS apps talking to? -- Compiling Personal Data and Subject Categories from App Data Models -- Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App -- Perceived Privacy Problems within Digital Contact Tracing: A Study Among Swedish Citizens -- Network Security -- Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC security -- Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption -- Advanced Cowrie Configuration to Increase Honeypot Deceptiveness -- Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-based Software Systems -- Machine Learning for Security -- TAR: Generalized Forensic Framework to Detect Deepfakes using Weakly Supervised Learning -- Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles -- Revitalizing Self-Organizing Map: Anomaly Detection using Forecasting Error Patterns -- Security Management -- What is lurking in your backups? -- How Do Users Chain Email Accounts Together? -- Tensions that hinder the implementation of digital.
ISBN: 9783030781200$q(electronic bk.)
Standard No.: 10.1007/978-3-030-78120-0doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / I45 2021
Dewey Class. No.: 005.8
ICT systems security and privacy protection36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021 : proceedings /
LDR
:03599nmm a2200349 a 4500
001
601964
003
DE-He213
005
20210706150615.0
006
m d
007
cr nn 008maaau
008
211112s2021 sz s 0 eng d
020
$a
9783030781200$q(electronic bk.)
020
$a
9783030781194$q(paper)
024
7
$a
10.1007/978-3-030-78120-0
$2
doi
035
$a
978-3-030-78120-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I45 2021
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I23 2021
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
ICT systems security and privacy protection
$h
[electronic resource] :
$b
36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021 : proceedings /
$c
edited by Audun Josang, Lynn Futcher, Janne Hagen.
246
3
$a
SEC 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xv, 448 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
IFIP advances in information and communication technology,
$x
1868-4238 ;
$v
625
505
0
$a
Digital Signatures -- XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany -- Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials -- SIUV: A Smart car Identity management and Usage control system based on Verifiable credentials -- Vulnerability Management -- A Performance Assessment of Free-to-use Vulnerability Scanners - Revisited -- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection -- Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware -- Covert Channels and Cryptography -- ESQABE: Predicting Encrypted Search Queries -- Reconnection-based Covert Channels in Wireless Networks -- Minecraft Altered Skin Channel (MASC) -- Lattice-based weak curve fault attack on ECDSA -- Application and System Security -- HyperSec: Visual Analytics for blockchain security monitoring -- 100 Popular Open-Source Infosec Tools -- RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators -- Privacy -- Accept All: The Landscape of Cookie Banners in Greece & the UK -- The AppChk Crowd-Sourcing Platform: Which third parties are iOS apps talking to? -- Compiling Personal Data and Subject Categories from App Data Models -- Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App -- Perceived Privacy Problems within Digital Contact Tracing: A Study Among Swedish Citizens -- Network Security -- Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC security -- Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption -- Advanced Cowrie Configuration to Increase Honeypot Deceptiveness -- Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-based Software Systems -- Machine Learning for Security -- TAR: Generalized Forensic Framework to Detect Deepfakes using Weakly Supervised Learning -- Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles -- Revitalizing Self-Organizing Map: Anomaly Detection using Forecasting Error Patterns -- Security Management -- What is lurking in your backups? -- How Do Users Chain Email Accounts Together? -- Tensions that hinder the implementation of digital.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
384606
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Computing Milieux.
$3
275270
700
1
$a
Josang, Audun.
$3
379591
700
1
$a
Futcher, Lynn.
$3
897580
700
1
$a
Hagen, Janne.
$3
897581
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
IFIP advances in information and communication technology ;
$v
370.
$3
559662
856
4 0
$u
https://doi.org/10.1007/978-3-030-78120-0
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000199614
電子館藏
1圖書
電子書
EB QA76.9.A25 I23 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-78120-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login