| TÃtulo : |
7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers |
| Tipo de documento: |
documento electrónico |
| Autores: |
Thampi, Sabu M., ; Martinez Perez, Gregorio, ; Ko, Ryan, ; Rawat, Danda B., |
| Mención de edición: |
1 ed. |
| Editorial: |
Singapore [Malasya] : Springer |
| Fecha de publicación: |
2020 |
| Número de páginas: |
XV, 376 p. 153 ilustraciones, 90 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-981-1548253-- |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Protección de datos Red informática Ordenadores CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Seguridad de datos e información Seguridad móvil y de red Entornos informáticos |
| Ãndice Dewey: |
5.824 |
| Resumen: |
Este libro constituye las actas arbitradas del Séptimo Simposio Internacional sobre Seguridad en Computación y Comunicaciones, SSCC 2019, celebrado en Trivandrum, India, en diciembre de 2019. Los 22 artÃculos completos revisados ​​y los 7 artÃculos breves revisados ​​presentados fueron cuidadosamente revisados ​​y seleccionados entre 61 presentaciones. . Los artÃculos cubren amplios campos de investigación que incluyen criptografÃa, seguridad de bases de datos y almacenamiento, aspectos humanos y sociales de la seguridad y la privacidad. |
| Nota de contenido: |
Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication inCloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers [documento electrónico] / Thampi, Sabu M., ; Martinez Perez, Gregorio, ; Ko, Ryan, ; Rawat, Danda B., . - 1 ed. . - Singapore [Malasya] : Springer, 2020 . - XV, 376 p. 153 ilustraciones, 90 ilustraciones en color. ISBN : 978-981-1548253-- Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Protección de datos Red informática Ordenadores CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Seguridad de datos e información Seguridad móvil y de red Entornos informáticos |
| Ãndice Dewey: |
5.824 |
| Resumen: |
Este libro constituye las actas arbitradas del Séptimo Simposio Internacional sobre Seguridad en Computación y Comunicaciones, SSCC 2019, celebrado en Trivandrum, India, en diciembre de 2019. Los 22 artÃculos completos revisados ​​y los 7 artÃculos breves revisados ​​presentados fueron cuidadosamente revisados ​​y seleccionados entre 61 presentaciones. . Los artÃculos cubren amplios campos de investigación que incluyen criptografÃa, seguridad de bases de datos y almacenamiento, aspectos humanos y sociales de la seguridad y la privacidad. |
| Nota de contenido: |
Malware Detection in Android Applications Using Integrated Static Features -- Intrusion Prediction and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities -- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions -- Detection and Analysis of Drive-by-Downloads and Malicious Websites -- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study -- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation -- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment -- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey -- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream -- Improving Sentiment Analysis of Arabic Tweets -- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity -- Towards a Privacy Web Scanner for End-Users -- Security of Quantum Cryptography -- The Impact of a Security Model in a Fog Computing Environment -- GOTCHA-I: A Multiview Human Videos Dataset -- Enhancing Enterprise IT Security with a Visualization-based Process Framework -- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit -- Realization of Re-Configurable True Random Number Generator on FPGA -- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher -- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics -- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process -- Exploitation of HTTP/2 Proxies for Cryptojacking -- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks -- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication inCloud Storage -- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective -- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification -- Braille Based Steganography System Using Dynamic Key Exchange. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |