| Título : |
12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers |
| Tipo de documento: |
documento electrónico |
| Autores: |
Benzekri, Abdelmalek, ; Barbeau, Michel, ; Gong, Guang, ; Laborde, Romain, ; Garcia-Alfaro, Joaquin, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2020 |
| Número de páginas: |
XIII, 408 p. 153 ilustraciones, 68 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-45371-8 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Gestión de base de datos Red de computadoras Inteligencia artificial Seguridad de datos e información Sistema de administración de base de datos Redes de comunicación informática |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye los artículos seleccionados revisados del 12.º Simposio Internacional sobre Fundamentos y Práctica de la Seguridad, FPS 2019, celebrado en Toulouse, Francia, en noviembre de 2019. Los 19 artículos completos y 9 artículos breves presentados en este libro fueron cuidadosamente revisados y seleccionados de 50 presentaciones. Cubren una variedad de temas, como enfoques de aprendizaje automático; prevención de ataques y confiabilidad; y modelos de control de acceso y criptografía. |
| Nota de contenido: |
Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers [documento electrónico] / Benzekri, Abdelmalek, ; Barbeau, Michel, ; Gong, Guang, ; Laborde, Romain, ; Garcia-Alfaro, Joaquin, . - 1 ed. . - [s.l.] : Springer, 2020 . - XIII, 408 p. 153 ilustraciones, 68 ilustraciones en color. ISBN : 978-3-030-45371-8 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Gestión de base de datos Red de computadoras Inteligencia artificial Seguridad de datos e información Sistema de administración de base de datos Redes de comunicación informática |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye los artículos seleccionados revisados del 12.º Simposio Internacional sobre Fundamentos y Práctica de la Seguridad, FPS 2019, celebrado en Toulouse, Francia, en noviembre de 2019. Los 19 artículos completos y 9 artículos breves presentados en este libro fueron cuidadosamente revisados y seleccionados de 50 presentaciones. Cubren una variedad de temas, como enfoques de aprendizaje automático; prevención de ataques y confiabilidad; y modelos de control de acceso y criptografía. |
| Nota de contenido: |
Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |