Computer Security – ESORICS 2019, Kazue Sako; Steve Schneider; Peter Y. A. Ryan
Автор: Larsen Per, Sadeghi Ahmad-Reza Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses ISBN: 1970001801 ISBN-13(EAN): 9781970001808 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 10352.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Автор: Kazue Sako; Steve Schneider; Peter Y. A. Ryan Название: Computer Security – ESORICS 2019 ISBN: 3030299589 ISBN-13(EAN): 9783030299583 Издательство: Springer Рейтинг: Цена: 13695.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. secure protocols; blockchain and smart contracts. Part II: software security;
Автор: Simon N. Foley; Dieter Gollmann; Einar Snekkenes Название: Computer Security – ESORICS 2017 ISBN: 3319663984 ISBN-13(EAN): 9783319663982 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions.
Описание: 7th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2019).- Combining GSN and STPA for safety arguments.- A modelling approach for system life cycles assurance.- Contract-based Modular Safety Cases for Incremental Certification of Product Lines.- 14th International ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2019).- Comparative Evaluation of Security Fuzzing Approaches.- Assuring compliance with protection profiles with Threatget.- A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Systems.- Combined Approach for Safety and Security.- Towards Integrated Quantitative Security and Safety Risk Assessment.- Potential Use of Safety Analysis for Risk Assessments in Smart City Sensor Network Applications.- Increasing Safety of Neural Networks in Medical Devices.- Smart Wristband for Voting.- 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR 2019).- Automotive Cybersecurity standards - relation and overview.- A Runtime Safety Monitoring Approach for Adaptable Autonomous Systems.- Structured Reasoning for Socio-Technical Factors of Safety-Security Assurance.- The SISTER approach for Verification and Validation: a lightweight process for reusable results.- Introduction to the Safecomp 2018 Workshop on Safety, securiTy, and pRivacy In automotiVe systEms (STRIVE 2018).- Demo: CANDY CREAM.- CarINA - Car sharing with IdeNtity based Access control re-enforced by TPM.- Combining Safety and Security in Autonomous Cars Using Blockchain Technologies.- Enhancing CAN security by means of lightweight stream-ciphers and protocols.- Analysis of Security Overhead in Broadcast V2V Communications.- You overtrust your printer.- 2nd International Workshop on Artificial Intelligence Safety Engineering (WAISE 2018).- Three Reasons Why: Framing the Challenges of Assuring AI.- Improving ML Safety with Partial Specifications.- An Abstraction-Refinement Approach to Formal Verification of Tree Ensembles.- RL-Based Method for Benchmarking the Adversarial Resilience and Robustness of Deep Reinforcement Learning Policies.- A Safety Standard Approach for Fully Autonomous Vehicles (Position Paper).- Open Questions in Testing of Learned Computer Vision Functions for Automated Driving.- Adaptive Deployment of Safety Monitors for Autonomous Systems.- Uncertainty Wrappers for Data-driven Models - Increase the Transparency of AI/ML-based Models through Enrichment with Dependable Situation-aware Uncertainty Estimates.- Confidence Arguments for Evidence of Performance in Machine Learning for Highly Automated Driving Functions.- Bayesian Uncertainty Quantification with Synthetic Data.- A Self-Certifiable Architecture for Critical Systems Powered by Probabilistic Logic Artificial Intelligence.- Tackling Uncertainty in Safety Assurance for Machine Learning: Continuous Argument Engineering with Attributed Tests.- The Moral Machine: Is It Moral.
Описание: By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other “devices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other “things”, which traditionally have not been Internet enabled.This “Internet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology.
Описание: The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy.Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.
Описание: This book constitutes the proceedings of the First International Conference on Emerging Trends in Engineering (ICETE), held at University College of Engineering and organised by the Alumni Association, University College of Engineering, Osmania University, in Hyderabad, India on 22–23 March 2019.The proceedings of the ICETE are published in three volumes, covering seven areas: Biomedical, Civil, Computer Science, Electrical & Electronics, Electronics & Communication, Mechanical, and Mining Engineering. The 215 peer-reviewed papers from around the globe present the latest state-of-the-art research, and are useful to postgraduate students, researchers, academics and industry engineers working in the respective fields. Volume 2 presents papers on the theme “Advances in Decision Sciences, Image Processing, Security and Computer Vision – International Conference on Emerging Trends in Engineering (ICETE)”. It includes state-of-the-art technical contributions in the areas of electronics and communication engineering and electrical and electronics engineering, discussing the latest sustainable developments in fields such as signal processing and communications; GNSS and VLSI; microwaves and antennas; signal, speech and image processing; power systems; and power electronics.
Автор: Skavhaug Название: Computer Safety, Reliability, and Security ISBN: 3319454765 ISBN-13(EAN): 9783319454764 Издательство: Springer Рейтинг: Цена: 8106.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016.
Описание: This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers.
Описание: Information Technology Security.- How can we justify trust in software based systems?.- The capacity of ciphers fulfilling the accessibility of cryptograms.- Parallelization of the Data Encryption Standard (DES) algorithm.- Linked authenticated dictionaries for certificate status verification.- Integrated Payment System for Public Key Infrastructure Services.- Some methods of the analysis and risk assessment in the PKI system services providers.- VAST: Versatile Anonymous System for Web Users.- Cryptography and Steganography: teaching experience.- Analysis of non-linear pseudo-noise sequences.- Tool support for detecting defects in object-oriented models.- The Proposal of Protocol for Electronic Signature Creation in Public Environment.- On Arithmetic Subtraction Linear Approximation.- Secure Data Transmission via Modulation of the Chaotic Sequence Parameters.- Biometric Systems.- Some Advances and Challenges in Live Biometrics, Personnel Management, and Other "Human Being" Applications.- An environment for recognition systems modeling.- Modified Gradient Method for Face Localization.- Three stage face recognition algorithm for visitor identification system.- A New Approach for Hand-Palm Recognition.- An Experimental Criterion for Face Classification.- Contour Objects Recognition Based On UNL-Fourier Descriptors.- Sonar Image Simulation by Means of Ray Tracing and Image Processing.- The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition Systems.- Investigation of fingerprint verification algorithm based on local centers method.- Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch.- Methods of Artificial Intelligence and Intelligent Agents.- A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites.- Training assisting program with hybrid decision supporting system.- Numerical problems with evaluating the fractal dimension of real data.- Multi-stage ship control in a fuzzy environment.- Informative value of the possibilistic extension principle.- Intelligent Marine Control Systems.- How to deal with the data in a bankruptcy modelling.- Dependency Mining in Large Sets of Stock Market Trading Rules.- Choosing representative data items: Kohonen, Neural Gas or Mixture Model?.- Application of the Ant Colony Algorithm for the Path Planning.- Application of fuzzy logic for track corrector formation into flight simulator.- Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space.- Adaptive simulation of separable dynamical systems in the neural network basis.- Improvement of the processors operating ratio in task scheduling using the deadline method.
Автор: Alexander Romanovsky; Elena Troubitsyna; Friedeman Название: Computer Safety, Reliability, and Security ISBN: 3030266001 ISBN-13(EAN): 9783030266004 Издательство: Springer Рейтинг: Цена: 8104.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 38th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2019, held in Turku, Finland, in September 2019. The 16 full and 5 short papers included in this volume were carefully reviewed and selected from 65 submissions.
Автор: Friedemann Bitsch; J?r?mie Guiochet; Mohamed Ka?ni Название: Computer Safety, Reliability, and Security ISBN: 3642407927 ISBN-13(EAN): 9783642407925 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013.The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru