Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Secure IT Systems -

Secure IT Systems

27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings

Hans P. Reiser, Marcel Kyas (Herausgeber)

Buch | Softcover
XIII, 388 Seiten
2023 | 1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-22294-8 (ISBN)
CHF 112,30 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.

On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIII, 388 p. 110 illus., 86 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 573 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Attack Detection • Communication Systems • computer crime • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • cryptography • Data communication systems • Data Security • digital forensics • distributed computer systems • Engineering • Formal Security Analysis • Internet • IoT security • malware analysis • Network Protocols • Network Security • privacy • Secure Protocols • side-channel attacks • Signal Processing • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems
ISBN-10 3-031-22294-6 / 3031222946
ISBN-13 978-3-031-22294-8 / 9783031222948
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20