Information Security Applications (eBook, PDF)
22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers
Redaktion: Kim, Hyoungshick
53,95 €
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
27 °P sammeln
53,95 €
Als Download kaufen
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
27 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
53,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
27 °P sammeln
Information Security Applications (eBook, PDF)
22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers
Redaktion: Kim, Hyoungshick
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021. The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 17.26MB
Andere Kunden interessierten sich auch für
- Computer Security - ESORICS 2021 (eBook, PDF)81,95 €
- Advances in Information and Computer Security (eBook, PDF)40,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)53,95 €
- Applied Cryptography and Network Security Workshops (eBook, PDF)73,95 €
- Innovative Security Solutions for Information Technology and Communications (eBook, PDF)40,95 €
- Constructive Side-Channel Analysis and Secure Design (eBook, PDF)65,95 €
- Advances in Information and Computer Security (eBook, PDF)57,95 €
-
-
-
This book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021.
The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 291
- Erscheinungstermin: 26. Oktober 2021
- Englisch
- ISBN-13: 9783030894320
- Artikelnr.: 62833321
- Verlag: Springer International Publishing
- Seitenzahl: 291
- Erscheinungstermin: 26. Oktober 2021
- Englisch
- ISBN-13: 9783030894320
- Artikelnr.: 62833321
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.
Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.