logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Data and Applications Security and Privacy XXXVII: 37th Annual Ifip Wg 11.3 Conference, Dbsec 2023, Sophia-Antipolis, France, July 19-21, 2023, Procee

Data and Applications Security and Privacy XXXVII: 37th Annual Ifip Wg 11.3 Conference, Dbsec 2023, Sophia-Antipolis, France, July 19-21, 2023, Procee (Paperback, 2023)

Vijayalakshmi Atluri, Anna Lisa Ferrara (엮은이)
Springer
223,480원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
201,130원 -10% 0원
6,040원
195,090원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Data and Applications Security and Privacy XXXVII: 37th Annual Ifip Wg 11.3 Conference, Dbsec 2023, Sophia-Antipolis, France, July 19-21, 2023, Procee
eBook 미리보기

책 정보

· 제목 : Data and Applications Security and Privacy XXXVII: 37th Annual Ifip Wg 11.3 Conference, Dbsec 2023, Sophia-Antipolis, France, July 19-21, 2023, Procee (Paperback, 2023) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9783031375859
· 쪽수 : 414쪽
· 출판일 : 2023-07-12

목차

Privacy 1.-?(Local) Differential Privacy has NO Disparate Impact on Fairness.-?Building Quadtrees for Spatial Data under Local Differential Privacy.-?Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy.-?Secure Data Sharing.-?New Results on Distributed Secret Sharing Protocols.-?Probabilistic Fingerprinting Scheme for Correlated Data.-?Optimized stream-cipher-based transciphering by means of functional-bootstrapping.-?Applications 1.-?Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends.-? Impact of using a privacy model on smart buildings data for CO2 prediction.-?Digital Twins for IoT Security Management.-?Privacy 2.-?Distribution Invariant Local Differential Privacy For Federated Learning.-?On the utility gain of iterative bayesian update for locally differentially private protocols.-?Differentially Private Streaming Data Release under Temporal Correlations via Post-processing.-?Access Control and Vulnerability Assessment.-?Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments.-?Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.-?SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity.-?Machine Learning.-?Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks.-? CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery.-?An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning.-?Mobile Applications.-?Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications.-?Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin.-?A Dynamic Approach to Defuse Logic Bombs in Android Applications.-?Applications 2.-?AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit.-?Essential Information from Vulnerability Descriptions for CVSS Evaluation.-?Hybrid Consensus in Blockchain Protocols for correctness and Progress.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책