Risks and Security of Internet and Systems : 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Cuppens, Frédéric. (Editor ), Cuppens, Nora. (Editor ), Lanet, Jean-Louis. (Editor ), Legay, Axel. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 10158
Materias:
LEADER 03268nam a22004455i 4500
001 000294360
005 20211108080620.0
007 cr nn 008mamaa
008 170301s2017 gw | s |||| 0|eng d
020 |a 9783319548760 
024 7 |a 10.1007/978-3-319-54876-0  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Risks and Security of Internet and Systems :  |b 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers /  |c edited by Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a VIII, 239 p. 67 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 10158 
505 0 |a Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point Detection in Dynamic Software Updating -- Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams -- Towards the weaving of the characteristics of good security requirements -- Methodology for Security -- Towards Empirical Evaluation of Automated Risk Assessment Methods -- An n-sided polygonal model to calculate the impact of cyber security events -- Security and Formal Methods -- SPTool – equivalence checker for SAND attack trees -- Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study -- Network Security -- A Proactive Stateful Firewall for Software Defined Networking -- Protocol Reverse Engineering: Challenges and Obfuscation -- Detection and Monitoring -- Detecting anomalous behavior in DBMS logs -- Online link disclosure strategies for social networks -- A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory -- Cryptography -- High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication -- Improving Side-Channel Attacks against Pairing-Based Cryptography -- A First DFA on PRIDE: from Theory to Practice. 
650 0 |a Data protection. 
650 0 |a Software engineering. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer organization. 
650 0 |a Computers. 
650 0 |a Application software. 
650 1 4 |a Security. 
650 2 4 |a Software Engineering/Programming and Operating Systems. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Information Systems Applications (incl. Internet). 
700 1 |a Cuppens, Frédéric.  |e editor. 
700 1 |a Cuppens, Nora.  |e editor. 
700 1 |a Lanet, Jean-Louis.  |e editor.  |0 (orcid)0000-0002-4751-3941  |1 https://orcid.org/0000-0002-4751-3941 
700 1 |a Legay, Axel.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
900 |a Libro descargado a ALEPH en bloque (proveniente de proveedor)