Muutke küpsiste eelistusi

E-raamat: Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016. The 17 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They cover diverse research themes, ranging from classic topics, such as intrustion detection, applied cryptography, formal methods and methodology for risk and security analysis, to emerging issues, such as ransomware and security of software defined networking or virtualization techniques.

 

Protection of Personal Data
CLiKC: A Privacy-Mindful Approach When Sharing Data
3(8)
Esma Aimeur
Gilles Brassard
Jonathan Rioux
Ransomware and the Legacy Crypto API
11(20)
Aurelien Palisse
Helene Le Bouder
Jean-Louis Lanet
Colas Le Guernic
Axel Legay
Risk and Security Analysis Methodology
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating
31(15)
Razika Lounas
Nisrine Jafri
Axel Legay
Mohamed Mezghiche
Jean-Louis Lanet
Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams
46(14)
Hela Hakim
Asma Sellami
Hanene Ben Abddallah
Towards the Weaving of the Characteristics of Good Security Requirements
60(17)
Sravani Teja Bulusu
Romain Laborde
Ahmad Samer Wazan
Francois Barrere
Abdelmalek Benzekri
Methodology for Security
Towards Empirical Evaluation of Automated Risk Assessment Methods
77(10)
Olga Gadyatskaya
Katsiaryna Labunets
Federica Paci
An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events
87(18)
Gustavo Gonzalez-Granadillo
Joaquin Garcia-Alfaro
Herve Debar
Security and Formal Methods
SPTool --- Equivalence Checker for SAND Attack Trees
105(9)
Barbara Kordy
Piotr Kordy
Yoann van den Boom
Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study
114(9)
Frederic Mangano
Simon Duquennoy
Nikolai Kosmatov
Network Security
A Proactive Stateful Firewall for Software Defined Networking
123(16)
Salaheddine Zerkane
David Espes
Philippe Le Pare
Frederic Cuppens
Protocol Reverse Engineering: Challenges and Obfuscation
139(8)
J. Duchene
C. Le Guernic
E. Alata
V. Nicomette
M. Kaaniche
Detection and Monitoring
Detecting Anomalous Behavior in DBMS Logs
147(6)
Muhammad Imran Khan
Simon N. Foley
Online Link Disclosure Strategies for Social Networks
153(16)
Younes Abid
Abdessamad Imine
Amedeo Napoli
Chedy Raissi
Michael Rusinowitch
A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory
169(16)
Rui Abreu
Cesar Andres
Ana R. Cavalli
Cryptography
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
185(14)
Amine Mrabet
Nadia El-Mrabet
Ronan Lashermes
Jean-Baptiste Rigaud
Belgacem Bouallegue
Sihem Mesnager
Mohsen Machhout
Improving Side-Channel Attacks Against Pairing-Based Cryptography
199(15)
Damien Jauvart
Jacques J.A. Fournier
Nadia El-Mrabet
Louis Goubin
A First DFA on PRIDE: From Theory to Practice
214(25)
Benjamin Lac
Marc Beunardeau
Anne Canteaut
Jacques J.A. Fournier
Renaud Sirdey
Author Index 239