logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Risks and Security of Internet and Systems: 13th International Conference, Crisis 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers

Risks and Security of Internet and Systems: 13th International Conference, Crisis 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers (Paperback, 2019)

Frederic Cuppens, Nora Cuppens-Boulahia, Akka Zemmari, Mohamed Mosbah (엮은이)
Springer International Publishing
98,730원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
80,950원 -18% 0원
4,050원
76,900원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Risks and Security of Internet and Systems: 13th International Conference, Crisis 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers
eBook 미리보기

책 정보

· 제목 : Risks and Security of Internet and Systems: 13th International Conference, Crisis 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers (Paperback, 2019) 
· 분류 : 외국도서 > 컴퓨터 > 소프트웨어 개발/엔지니어링 > 일반
· ISBN : 9783030121426
· 쪽수 : 237쪽
· 출판일 : 2019-01-25

목차

An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.- Are Third-Party Libraries Secure? A Software Library Checker for Java.- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems.- Outsourcing Signatures of Confidential Documents.- Trust evaluation model for attack detection in Social Internet of Things.- A certificate-less key exchange protocol for IoT.- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning.- Privacy Preserving Data Offloading based on Transformation.- DSTC: DNS-based Strict TLS Configurations.- Authenticated Quality of Service Aware Routing in Software Defined Networks.- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).- Enhancing Collaboration between Security Analysts in Security Operations Centers.- RIICS: Risk based IICS segmentation Method.- Effectiveness and Impact measurements of a diversification based Moving Target Defense.- Practical security exploits of the FlexRay in-vehicle communication Protocol.- Connection Dumping Vulnerability Affecting Bluetooth Availability.- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.- Optimal Distribution of Privacy Budget in Differential Privacy.

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책