Arama Sonuçları - "Attacker"

Sonuçları Daraltın
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645

    The Joy of Cryptography Yazar: Rosulek, Mike

    Baskı/Yayın Bilgisi 2021
    İçindekiler: “…0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption…”
    Access online version
    Elektronik Ekitap
  6. 646

    Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /

    Baskı/Yayın Bilgisi 2020
    İçindekiler: “…Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.…”
    Link to Metadata
    Elektronik Ekitap
  7. 647

    Security in Computer and Information Sciences Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers /

    Baskı/Yayın Bilgisi 2022
    İçindekiler: “…AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results -- Application of a Human-Centric Approach in Security by Design for IoT Architecture Development -- An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction -- Correlation-based Anomaly Detection for the CAN Bus -- Botnet Attack Detection with Incremental Online Learning -- Optimizing Energy Usage for an Electric Drone -- T-RAID: TEE-based Remote Attestation for IoT Devices -- Secure Authentication for everyone! …”
    Link to Metadata
    Elektronik Ekitap
  8. 648

    Computer Systems Security Planning for Success Yazar: Tolboom, Ryan

    İçindekiler: “…Malware -- 4. Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. …”
    Access online version
    Elektronik Ekitap
  9. 649

    Security of Ubiquitous Computing Systems Selected Topics /

    Baskı/Yayın Bilgisi 2021
    İçindekiler: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
    Link to Metadata
    Elektronik Ekitap
  10. 650

    Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...

    Baskı/Yayın Bilgisi 2018
    İçindekiler: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
    Link to Metadata
    Elektronik Ekitap
  11. 651

    Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Swi...

    Baskı/Yayın Bilgisi 2017
    İçindekiler: “…Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.…”
    Link to Metadata
    Elektronik Ekitap
  12. 652

    Silicon Valley Cybersecurity Conference Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers /

    Baskı/Yayın Bilgisi 2022
    İçindekiler: “…Malware Analysis -- Robustness of Image-Based Malware Analysis -- Word Embeddings for Fake Malware Generation -- Twitter bots detection with Benford's Law and Machine Learning -- Blockchain and Smart Contracts -- A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection -- Smart Contracts in the Cloud -- A Blockchain-based Tamper-resistant Logging Framework -- Remote Device Assessment -- Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks -- Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.…”
    Link to Metadata
    Elektronik Ekitap
  13. 653

    The Asian 21st Century Yazar: Mahbubani, Kishore

    Baskı/Yayın Bilgisi 2022
    İçindekiler: “…-- What Do US Capitol Attack and the West's Covid-19 Death Rates Have in Common? …”
    Link to Metadata
    Elektronik Ekitap
  14. 654

    Fundamental Approaches to Software Engineering 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 20...

    Baskı/Yayın Bilgisi 2018
    İçindekiler: “…Model-Based Software Development -- A Formal Framework for Incremental Model Slicing -- Multiple Model Synchronization with Multiary Delta Lenses -- Controlling the Attack Surface of Object-Oriented Refactorings -- Efficient Analysis of Attack Trees: a Model-Driven Approach -- Distributed Program and System Analysis -- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis -- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism -- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems -- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States -- Software Design and Verification -- Hierarchical Specification and Verification of Architectural Design Patterns -- Supporting Verification-Driven Incremental Distributed Design of Components -- Summarizing Software API Usage Examples using Clustering Techniques -- Fast Computation of Arbitrary Control Dependencies -- Specification and Program Testing -- Iterative Generation of Diverse Models for Testing Specifications of SL Tools -- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications -- TCM: Test Case Mutation to Improve Crash Detection in Android -- CRETE: A Versatile Binary-Level Concolic Testing Framework -- Family-Based Software Development -- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* -- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems -- Taming Multi-Variability of Software Product Line Transformations.…”
    Link to Metadata
    Elektronik Ekitap
  15. 655

    A Tale of Two Systems Yazar: Reitsma, René, Krueger, Kevin

    Baskı/Yayın Bilgisi 2017
    İçindekiler: “…a Word Processor -- Appendix B: (Unintended?) Denial of Service Attack -- Appendix C: Fake Link Requests -- Appendix D: I am robot……”
    Access online version
    Elektronik Ekitap
  16. 656

    Machine Learning for Cyber Physical Systems Selected papers from the International Conference ML4CPS 2020 /

    Baskı/Yayın Bilgisi 2021
    İçindekiler: “…Preface -- Energy Profile Prediction of Milling Processes Using Machine Learning Techniques -- Improvement of the prediction quality of electrical load profiles with artficial neural networks -- Detection and localization of an underwater docking station -- Deployment architecture for the local delivery of ML-Models to the industrial shop floor -- Deep Learning in Resource and Data Constrained Edge Computing Systems -- Prediction of Batch Processes Runtime Applying Dynamic Time Warping and Survival Analysis -- Proposal for requirements on industrial AI solutions -- Information modeling and knowledge extraction for machine learning applications in industrial production systems -- Explanation Framework for Intrusion Detection -- Automatic Generation of Improvement Suggestions for Legacy, PLC Controlled Manufacturing Equipment Utilizing Machine Learning -- Hardening Deep Neural Networks in Condition Monitoring Systems against Adversarial ExampleAttacks -- First Approaches to Automatically Diagnose and Reconfigure Hybrid Cyber-Physical Systems -- Machine learning for reconstruction of highly porous structures from FIB-SEM nano-tomographic data.…”
    Link to Metadata
    Elektronik Ekitap
  17. 657

    Computational Conflict Research

    Baskı/Yayın Bilgisi 2020
    İçindekiler: “…Chapter1: Advancing Conflict Research through Computational Approaches -- PARTI: Data and Methods in Computational Conflict Research -- Chapter2: Advances in Data on Conflict and Dissent -- Chapter3: Text as Data for Conflict Research: A Literature Survey -- Chapter4: Interdependencies in Conflict Dynamics: Analyzing Endogenous Patterns in Conflict Event Data Using Relational Event Models -- PARTII: Computational Research on Non-violent Conflict -- Chapter5: Migration Policy Framing in Political Discourse: Evidence from Canada and the US -- Chapter6: The Role of Network Structure and Initial Group Norm Distribution in Norm Conflict -- Chapter7: On the Fate of Protests: Dynamics of Activation and Topic Selection Online and In the Streets -- PartIII: Computational Research on Violent Conflict -- Chapter8: Do Non-State Armed Groups influence each other in attack timing and frequency? Generating, analyzing, and comparing empirical data and simulation -- Chapter9: On the Beaten Path: Violence against Civilians and Simulated Conflict along Road Networks -- Chapter10: Analysis of Conflict Diffusion over Continuous Space,- Chapter11: Rebel Group Protection Rackets: Simulating the Effects of Economic Support on Civil War Violence.…”
    Link to Metadata
    Elektronik Ekitap
  18. 658

    Microorganisms in the Deterioration and Preservation of Cultural Heritage

    Baskı/Yayın Bilgisi 2021
    İçindekiler: “…Part 1: Occurrence of microorganisms in heritage materials -- Chapter 1: Microbial growth and its effects on inorganic heritage materials -- Chapter 2: Microbiota and biochemical processes involved for biodeterioration of cultural heritage and protection -- Chapter 3: Molecular-based techniques for the study of microbial communities in artworks -- Chapter 4: Extreme colonizers and rapid profiteers: the challenging world of microorganisms that attack paper and parchment -- Part 2: Green methods again biodeterioration -- Chapter 5: Novel antibiofilm non-biocide strategies -- Chapter 6: Green mitigation strategy for cultural heritage using bacterial biocides -- Chapter 7: New perspectives against biodeterioration through public lighting -- Part 3: Biocleaning and bio-based conservation methods -- Chapter 8: Bioremoval of graffiti in the context of current biocleaning research -- Chapter 9: Ancient textiles deterioration and restoration: the case of biocleaning of an Egyptian shroud heldin the Torino Museum" -- Chapter 10: Advanced biocleaning system for historical wall paintings -- Chapter 11: Sustainable restoration through biotechnological processes: a proof of concept -- Chapter 12: The role microorganisms for the removal of nitrates and sulfates on artistic stoneworks -- Chapter 13: Protection and consolidation of stone heritage by bacterial carbonatogenesis -- Chapter 14: Siderophore-removal of iron corrosion products from wood and textiles -- Chapter 15: Bio-based corrosion inhibitors for metal heritage. .…”
    Link to Metadata
    Elektronik Ekitap
  19. 659

    Tools and Algorithms for the Construction and Analysis of Systems 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice o...

    Baskı/Yayın Bilgisi 2019
    İçindekiler: “…SAT and SMT -- Decomposing Farkas Interpolants -- Parallel SAT Simplification on GPU Architectures -- Encoding Redundancy for Satisfaction-Driven Clause Learning -- WAPS: Weighted and Projected Sampling -- Building Better Bit-Blasting for Floating-Point Problems -- The Axiom Profiler: Understanding and Debugging SMT Quantifier Instantiations -- On the Empirical Time Complexity of Scale-Free 3-SAT at the Phase Transition -- Modular and Efficient Divide-and-Conquer SAT Solver on Top of the Painless Framework -- SAT Solving and Theorem Proving -- Quantitative Verification of Masked Arithmetic Programs against Side-Channel Attacks -- Incremental Analysis of Evolving Alloy Models -- Extending a Brainiac Prover to Lambda-Free Higher-Order Logic -- Verification and Analysis LCV: A Verification Tool for Linear Controller Software -- Semantic Fault Localization and Suspiciousness Ranking -- Computing Coupled Similarity -- Reachability Analysis for Termination and Confluence of Rewriting -- Model Checking -- VoxLogicA: a Spatial Model Checker for Declarative Image Analysis -- On Reachability in Parameterized Phaser Programs -- Abstract Dependency Graphs and Their Application to Model Checking -- Tool Demo -- nonreach - A Tool for Nonreachability Analysis -- The Quantitative Verification Benchmark Set -- ILAng: A Modeling Platform for SoC Verification using Instruction-Level Abstractions -- MetAcsl: Specification and Verification of High-Level Properties -- ROLL 1.0: !…”
    Link to Metadata
    Elektronik Ekitap
  20. 660

    Human Factors in Privacy Research

    Baskı/Yayın Bilgisi 2023
    İçindekiler: “…- Challenges for Privacy Nudge Design -- Chapter 9 The Hows and Whys of Dark Patterns: Categorizations and Privacy -- Chapter 10 "They see me scrolling" - Lessons Learned From Investigating Shoulder Surfing Behavior and Attack Mitigation Strategies -- Chapter 11 Privacy Research on the Pulse of Time: COVID-19 Contact Tracing Apps -- Chapter 12 Privacy Perception and Behavior in Safety-Critical Environments -- Part IV Solutions -- Chapter 13 Generic Consents in Digital Ecosystems: Legal, Psychological and Technical Perspectives -- Chapter 14 Human-Centered Design for Data-Sparse Tailored Privacy Information Provision -- Chapter 15 Acceptance Factors of Privacy Enhancing Technologies on the Basis of Tor and JonDonym -- Chapter 16 Increasing Users' Privacy Awareness in the Internet of Things: Design Space and Sample Scenarios -- Chapter 17 Challenges, Conflicts and Solution Strategies for the Introduction of Corporate Data Protection Measures -- Chapter 18 Data Cart - A Privacy Pattern for Personal Data Management in Organizations.…”
    Link to Metadata
    Elektronik Ekitap