logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings

ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Paperback)

Kai Rannenberg, Tatjana Welzer, Marko Holbl (엮은이)
Springer
245,970원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
201,690원 -18% 0원
10,090원
191,600원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings
eBook 미리보기

책 정보

· 제목 : ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 정보통신기술(IT)
· ISBN : 9783030582036
· 쪽수 : 448쪽
· 출판일 : 2021-09-03

목차

Channel Attacks.- Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems.- Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels.- IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks through Indirect Eviction.- Connection Security.- Refined detection of SSH brute-force attackers using machine learning.- MultiTLS: Secure communication channel with cipher suite diversity.- Improving Big Data Clustering for Jamming Detection in Smart Mobility.- Human Aspects of Security and Privacy.- Assisting users to create stronger passwords using Context Based Micro Training.- Facilitating Privacy Attitudes & Behaviors with Affective Visual Design.- Privacy CURE: Consent Comprehension Made Easy.- Detecting Malware and Software Weaknesses.- JavaScript malware detection using locality sensitive hashing.- RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding.- Code between the Lines: Semantic Analysis of Android Applications.- System Security.- IMShell-Dec:Pay More Attention to External Links in PowerShell.- Secure Attestation of Virtualized Environments.- Network Security and Privacy.- Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor.- Actively Probing Routes for Tor AS-level Adversaries with RIPE Atlas.- zeek-osquery: Host-Network Correlations for Advanced Monitoring and Intrusion Detection.- Access Control and Authentication.- Revisiting Security Vulnerabilities in Commercial Password Managers.- Evaluation of Risk-based Re-Authentication Methods.- Fuzzy Vault for Behavioral Authentication System.- Crypto Currencies.- Improvements of the Balance Discovery Attack on Lightning Network Payment Channels.- CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin.- Privacy-friendly Monero transaction signing on a hardware wallet.- Privacy and Security Management.- A Matter of Life and Death: Analyzing the Security of Healthcare Networks.- Establishing a Strong Baseline for Privacy Policy Classification.- Cross-Platform File System Activity Monitoring and Forensics ? A Semantic Approach.- Machine Learning and Security.- Correlations-Preserving Fingerprinting Technique for Categorical Data in Relational Databases.- FDFtNet: Facing Off Fake Images using Fake Detection Fine-tuning Network.- Escaping Backdoor Attack Detection of Deep Learning.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책