Atjaunināt sīkdatņu piekrišanu

E-grāmata: Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 10158
  • Izdošanas datums: 01-Mar-2017
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319548760
  • Formāts - EPUB+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 10158
  • Izdošanas datums: 01-Mar-2017
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319548760

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016. The 17 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They cover diverse research themes, ranging from classic topics, such as intrustion detection, applied cryptography, formal methods and methodology for risk and security analysis, to emerging issues, such as ransomware and security of software defined networking or virtualization techniques.

 

Protection of Personal Data
CLiKC: A Privacy-Mindful Approach When Sharing Data
3(8)
Esma Aimeur
Gilles Brassard
Jonathan Rioux
Ransomware and the Legacy Crypto API
11(20)
Aurelien Palisse
Helene Le Bouder
Jean-Louis Lanet
Colas Le Guernic
Axel Legay
Risk and Security Analysis Methodology
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating
31(15)
Razika Lounas
Nisrine Jafri
Axel Legay
Mohamed Mezghiche
Jean-Louis Lanet
Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams
46(14)
Hela Hakim
Asma Sellami
Hanene Ben Abddallah
Towards the Weaving of the Characteristics of Good Security Requirements
60(17)
Sravani Teja Bulusu
Romain Laborde
Ahmad Samer Wazan
Francois Barrere
Abdelmalek Benzekri
Methodology for Security
Towards Empirical Evaluation of Automated Risk Assessment Methods
77(10)
Olga Gadyatskaya
Katsiaryna Labunets
Federica Paci
An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events
87(18)
Gustavo Gonzalez-Granadillo
Joaquin Garcia-Alfaro
Herve Debar
Security and Formal Methods
SPTool --- Equivalence Checker for SAND Attack Trees
105(9)
Barbara Kordy
Piotr Kordy
Yoann van den Boom
Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study
114(9)
Frederic Mangano
Simon Duquennoy
Nikolai Kosmatov
Network Security
A Proactive Stateful Firewall for Software Defined Networking
123(16)
Salaheddine Zerkane
David Espes
Philippe Le Pare
Frederic Cuppens
Protocol Reverse Engineering: Challenges and Obfuscation
139(8)
J. Duchene
C. Le Guernic
E. Alata
V. Nicomette
M. Kaaniche
Detection and Monitoring
Detecting Anomalous Behavior in DBMS Logs
147(6)
Muhammad Imran Khan
Simon N. Foley
Online Link Disclosure Strategies for Social Networks
153(16)
Younes Abid
Abdessamad Imine
Amedeo Napoli
Chedy Raissi
Michael Rusinowitch
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory
169(16)
Rui Abreu
Cesar Andres
Ana R. Cavalli
Cryptography
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
185(14)
Amine Mrabet
Nadia El-Mrabet
Ronan Lashermes
Jean-Baptiste Rigaud
Belgacem Bouallegue
Sihem Mesnager
Mohsen Machhout
Improving Side-Channel Attacks Against Pairing-Based Cryptography
199(15)
Damien Jauvart
Jacques J.A. Fournier
Nadia El-Mrabet
Louis Goubin
A First DFA on PRIDE: From Theory to Practice
214(25)
Benjamin Lac
Marc Beunardeau
Anne Canteaut
Jacques J.A. Fournier
Renaud Sirdey
Author Index 239