Arama Sonuçları - "Attacker"
Önerilen Konular
Önerilen Konular
- Terrorism, armed struggle 47
- History of engineering & technology 46
- Technology: general issues 42
- Warfare & defence 20
- International relations 19
- Media studies 18
- Politics & government 18
- Research & information: general 17
- Computer security 15
- Society & social sciences 15
- Humanities 14
- Medicine 14
- Computer networks 12
- Computer science 12
- Information technology industries 12
- Military engineering 12
- Violence in society 12
- Data protection 11
- European history 11
- Sociology 11
- Data and Information Security 10
- Social & cultural history 10
- Artificial intelligence 9
- Biology, life sciences 9
- History of the Americas 9
- Literature: history & criticism 9
- Asian history 8
- History 8
- Philosophy 8
- Political science & theory 8
-
641
-
642
-
643
-
644
مقارنة بين أسلوبي الإخفاء في المجالين: الفراغي والترددي للصور الرقميَة
Baskı/Yayın Bilgisi 2018Connect to this object online.
Kitap -
645
The Joy of Cryptography
Baskı/Yayın Bilgisi 2021İçindekiler: “…0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption…”
Access online version
Elektronik Ekitap -
646
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
Baskı/Yayın Bilgisi 2020İçindekiler: “…Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.…”
Link to Metadata
Elektronik Ekitap -
647
Security in Computer and Information Sciences Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers /
Baskı/Yayın Bilgisi 2022İçindekiler: “…AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results -- Application of a Human-Centric Approach in Security by Design for IoT Architecture Development -- An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction -- Correlation-based Anomaly Detection for the CAN Bus -- Botnet Attack Detection with Incremental Online Learning -- Optimizing Energy Usage for an Electric Drone -- T-RAID: TEE-based Remote Attestation for IoT Devices -- Secure Authentication for everyone! …”
Link to Metadata
Elektronik Ekitap -
648
Computer Systems Security Planning for Success
Access online version
Elektronik Ekitap -
649
Security of Ubiquitous Computing Systems Selected Topics /
Baskı/Yayın Bilgisi 2021İçindekiler: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Elektronik Ekitap -
650
Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...
Baskı/Yayın Bilgisi 2018İçindekiler: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
Link to Metadata
Elektronik Ekitap -
651
Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Swi...
Baskı/Yayın Bilgisi 2017İçindekiler: “…Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.…”
Link to Metadata
Elektronik Ekitap -
652
Silicon Valley Cybersecurity Conference Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers /
Baskı/Yayın Bilgisi 2022İçindekiler: “…Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford's Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.…”
Link to Metadata
Elektronik Ekitap -
653
The Asian 21st Century
Baskı/Yayın Bilgisi 2022İçindekiler: “…-- What Do US Capitol Attack and the West's Covid-19 Death Rates Have in Common? …”
Link to Metadata
Elektronik Ekitap -
654
Fundamental Approaches to Software Engineering 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 20...
Baskı/Yayın Bilgisi 2018İçindekiler: “…Model-Based Software Development -- A Formal Framework for Incremental Model Slicing -- Multiple Model Synchronization with Multiary Delta Lenses -- Controlling the Attack Surface of Object-Oriented Refactorings -- Efficient Analysis of Attack Trees: a Model-Driven Approach -- Distributed Program and System Analysis -- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis -- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism -- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems -- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States -- Software Design and Verification -- Hierarchical Specification and Verification of Architectural Design Patterns -- Supporting Verification-Driven Incremental Distributed Design of Components -- Summarizing Software API Usage Examples using Clustering Techniques -- Fast Computation of Arbitrary Control Dependencies -- Specification and Program Testing -- Iterative Generation of Diverse Models for Testing Specifications of SL Tools -- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications -- TCM: Test Case Mutation to Improve Crash Detection in Android -- CRETE: A Versatile Binary-Level Concolic Testing Framework -- Family-Based Software Development -- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* -- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems -- Taming Multi-Variability of Software Product Line Transformations.…”
Link to Metadata
Elektronik Ekitap -
655
A Tale of Two Systems
Baskı/Yayın Bilgisi 2017İçindekiler: “…a Word Processor -- Appendix B: (Unintended?) Denial of Service Attack -- Appendix C: Fake Link Requests -- Appendix D: I am robot……”
Access online version
Elektronik Ekitap -
656
Machine Learning for Cyber Physical Systems Selected papers from the International Conference ML4CPS 2020 /
Baskı/Yayın Bilgisi 2021İçindekiler: “…Preface -- Energy Profile Prediction of Milling Processes Using Machine Learning Techniques -- Improvement of the prediction quality of electrical load profiles with artficial neural networks -- Detection and localization of an underwater docking station -- Deployment architecture for the local delivery of ML-Models to the industrial shop floor -- Deep Learning in Resource and Data Constrained Edge Computing Systems -- Prediction of Batch Processes Runtime Applying Dynamic Time Warping and Survival Analysis -- Proposal for requirements on industrial AI solutions -- Information modeling and knowledge extraction for machine learning applications in industrial production systems -- Explanation Framework for Intrusion Detection -- Automatic Generation of Improvement Suggestions for Legacy, PLC Controlled Manufacturing Equipment Utilizing Machine Learning -- Hardening Deep Neural Networks in Condition Monitoring Systems against Adversarial ExampleAttacks -- First Approaches to Automatically Diagnose and Reconfigure Hybrid Cyber-Physical Systems -- Machine learning for reconstruction of highly porous structures from FIB-SEM nano-tomographic data.…”
Link to Metadata
Elektronik Ekitap -
657
Computational Conflict Research
Baskı/Yayın Bilgisi 2020İçindekiler: “…Chapter1: Advancing Conflict Research through Computational Approaches -- PARTI: Data and Methods in Computational Conflict Research -- Chapter2: Advances in Data on Conflict and Dissent -- Chapter3: Text as Data for Conflict Research: A Literature Survey -- Chapter4: Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models -- PARTII: Computational Research on Non-violent Conflict -- Chapter5: Migration Policy Framing in Political Discourse: Evidence from Canada and the US -- Chapter6: The Role of Network Structure and Initial Group Norm Distribution in Norm Conflict -- Chapter7: On the Fate of Protests: Dynamics of Activation and Topic Selection Online and In the Streets -- PartIII: Computational Research on Violent Conflict -- Chapter8: Do Non-State Armed Groups influence each other in attack timing and frequency? Generating, analyzing, and comparing empirical data and simulation -- Chapter9: On the Beaten Path: Violence against Civilians and Simulated Conflict along Road Networks -- Chapter10: Analysis of Conflict Diffusion over Continuous Space,- Chapter11: Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence.…”
Link to Metadata
Elektronik Ekitap -
658
Microorganisms in the Deterioration and Preservation of Cultural Heritage
Baskı/Yayın Bilgisi 2021İçindekiler: “…Part 1: Occurrence of microorganisms in heritage materials -- Chapter 1: Microbial growth and its effects on inorganic heritage materials -- Chapter 2: Microbiota and biochemical processes involved for biodeterioration of cultural heritage and protection -- Chapter 3: Molecular-based techniques for the study of microbial communities in artworks -- Chapter 4: Extreme colonizers and rapid profiteers: the challenging world of microorganisms that attack paper and parchment -- Part 2: Green methods again biodeterioration -- Chapter 5: Novel antibiofilm non-biocide strategies -- Chapter 6: Green mitigation strategy for cultural heritage using bacterial biocides -- Chapter 7: New perspectives against biodeterioration through public lighting -- Part 3: Biocleaning and bio-based conservation methods -- Chapter 8: Bioremoval of graffiti in the context of current biocleaning research -- Chapter 9: Ancient textiles deterioration and restoration: the case of biocleaning of an Egyptian shroud heldin the Torino Museum" -- Chapter 10: Advanced biocleaning system for historical wall paintings -- Chapter 11: Sustainable restoration through biotechnological processes: a proof of concept -- Chapter 12: The role microorganisms for the removal of nitrates and sulfates on artistic stoneworks -- Chapter 13: Protection and consolidation of stone heritage by bacterial carbonatogenesis -- Chapter 14: Siderophore-removal of iron corrosion products from wood and textiles -- Chapter 15: Bio-based corrosion inhibitors for metal heritage. .…”
Link to Metadata
Elektronik Ekitap -
659
Tools and Algorithms for the Construction and Analysis of Systems 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice o...
Baskı/Yayın Bilgisi 2019İçindekiler: “…SAT and SMT -- Decomposing Farkas Interpolants -- Parallel SAT Simplification on GPU Architectures -- Encoding Redundancy for Satisfaction-Driven Clause Learning -- WAPS: Weighted and Projected Sampling -- Building Better Bit-Blasting for Floating-Point Problems -- The Axiom Profiler: Understanding and Debugging SMT Quantifier Instantiations -- On the Empirical Time Complexity of Scale-Free 3-SAT at the Phase Transition -- Modular and Efficient Divide-and-Conquer SAT Solver on Top of the Painless Framework -- SAT Solving and Theorem Proving -- Quantitative Verification of Masked Arithmetic Programs against Side-Channel Attacks -- Incremental Analysis of Evolving Alloy Models -- Extending a Brainiac Prover to Lambda-Free Higher-Order Logic -- Verification and Analysis LCV: A Verification Tool for Linear Controller Software -- Semantic Fault Localization and Suspiciousness Ranking -- Computing Coupled Similarity -- Reachability Analysis for Termination and Confluence of Rewriting -- Model Checking -- VoxLogicA: a Spatial Model Checker for Declarative Image Analysis -- On Reachability in Parameterized Phaser Programs -- Abstract Dependency Graphs and Their Application to Model Checking -- Tool Demo -- nonreach - A Tool for Nonreachability Analysis -- The Quantitative Verification Benchmark Set -- ILAng: A Modeling Platform for SoC Verification using Instruction-Level Abstractions -- MetAcsl: Specification and Verification of High-Level Properties -- ROLL 1.0: !…”
Link to Metadata
Elektronik Ekitap -
660
Human Factors in Privacy Research
Baskı/Yayın Bilgisi 2023İçindekiler: “…- Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.…”
Link to Metadata
Elektronik Ekitap