Information Security Practice and Experience最新文献

筛选
英文 中文
CATCHA: When Cats Track Your Movements Online CATCHA:当猫在网上跟踪你的一举一动
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_10
Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat
{"title":"CATCHA: When Cats Track Your Movements Online","authors":"Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat","doi":"10.1007/978-3-030-34339-2_10","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_10","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Preserving Approach in Dynamic Social Network Data Publishing 动态社交网络数据发布中的隐私保护方法
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_21
Kamalkumar R. Macwan, Sankita J. Patel
{"title":"Privacy Preserving Approach in Dynamic Social Network Data Publishing","authors":"Kamalkumar R. Macwan, Sankita J. Patel","doi":"10.1007/978-3-030-34339-2_21","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_21","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Generating Phishing Emails Using Graph Database 利用图形数据库生成网络钓鱼邮件
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_25
Nasim Maleki, A. Ghorbani
{"title":"Generating Phishing Emails Using Graph Database","authors":"Nasim Maleki, A. Ghorbani","doi":"10.1007/978-3-030-34339-2_25","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_25","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using IFTTT to Express and Enforce UCON Obligations 使用IFTTT来表达和执行UCON义务
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_12
Antonio La Marra, F. Martinelli, P. Mori, Athanasios Rizos, A. Saracino
{"title":"Using IFTTT to Express and Enforce UCON Obligations","authors":"Antonio La Marra, F. Martinelli, P. Mori, Athanasios Rizos, A. Saracino","doi":"10.1007/978-3-030-34339-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_12","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection 协同入侵检测中基于支持向量机的入侵灵敏度分配评估
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_26
Wenjuan Li, W. Meng, Lam-for Kwok
{"title":"Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection","authors":"Wenjuan Li, W. Meng, Lam-for Kwok","doi":"10.1007/978-3-030-34339-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_26","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recovering Internal States of Grain-v1 恢复Grain-v1的内部状态
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_18
Deepak Kumar Dalai, Santu Pal
{"title":"Recovering Internal States of Grain-v1","authors":"Deepak Kumar Dalai, Santu Pal","doi":"10.1007/978-3-030-34339-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_18","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings 基于椭圆曲线自同态环的改进数字签名
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_16
Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, R. Azarderakhsh
{"title":"Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings","authors":"Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, R. Azarderakhsh","doi":"10.1007/978-3-030-34339-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_16","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm 弱密码的(持续)威胁:一种半自动密码破解算法的实现
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_27
C. Pelchen, David Jaeger, Feng Cheng, C. Meinel
{"title":"The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm","authors":"C. Pelchen, David Jaeger, Feng Cheng, C. Meinel","doi":"10.1007/978-3-030-34339-2_27","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_27","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132986245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel and Comprehensive Evaluation Methodology for SIEM 一种新的SIEM综合评价方法
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_28
M. Safarzadeh, Hossein Gharaee, A. Panahi
{"title":"A Novel and Comprehensive Evaluation Methodology for SIEM","authors":"M. Safarzadeh, Hossein Gharaee, A. Panahi","doi":"10.1007/978-3-030-34339-2_28","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_28","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Software PUF Based on Gyroscope 基于陀螺仪的PUF软件评价
Information Security Practice and Experience Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_13
Kazuhide Fukushima, Ayumu Yoshimura, S. Kiyomoto, Norikazu Yamasaki
{"title":"Evaluation of Software PUF Based on Gyroscope","authors":"Kazuhide Fukushima, Ayumu Yoshimura, S. Kiyomoto, Norikazu Yamasaki","doi":"10.1007/978-3-030-34339-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_13","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133914839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信