Mathematical Methods, Models, and Architectures for Network Security Systems最新文献

筛选
英文 中文
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems 一种新的统一的信息物理系统可信度观
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_26
S. Drager, J. Zalewski
{"title":"A Novel and Unifying View of Trustworthiness in Cyberphysical Systems","authors":"S. Drager, J. Zalewski","doi":"10.1007/978-3-319-65127-9_26","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_26","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Mining and Information Security 数据挖掘与信息安全
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_3
A. Grusho
{"title":"Data Mining and Information Security","authors":"A. Grusho","doi":"10.1007/978-3-319-65127-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_3","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116623130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS HEPPA:高效的ITS隐私保护认证
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_21
An Braeken, S. Bezzateev, A. Touhafi, N. Voloshina
{"title":"HEPPA: Highly Efficient Privacy Preserving Authentication for ITS","authors":"An Braeken, S. Bezzateev, A. Touhafi, N. Voloshina","doi":"10.1007/978-3-319-65127-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_21","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"18 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs 基于plc的工业控制系统延时注入攻击的检测与缓解
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_6
E. Korkmaz, M. Davis, A. Dolgikh, V. Skormin
{"title":"Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs","authors":"E. Korkmaz, M. Davis, A. Dolgikh, V. Skormin","doi":"10.1007/978-3-319-65127-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_6","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Concept of Clustering-Based Method for Botnet Detection 基于聚类的僵尸网络检测方法的概念
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_18
Hubert Ostap, R. Antkiewicz
{"title":"A Concept of Clustering-Based Method for Botnet Detection","authors":"Hubert Ostap, R. Antkiewicz","doi":"10.1007/978-3-319-65127-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_18","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis 利用奇异频谱分析的认知无线电网络异常检测
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_20
Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, K. Zeng
{"title":"Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis","authors":"Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, K. Zeng","doi":"10.1007/978-3-319-65127-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_20","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security Assessment of Cryptographic Algorithms 密码算法的安全性评估
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_24
M. Niemiec, Maciej Francikiewicz
{"title":"Security Assessment of Cryptographic Algorithms","authors":"M. Niemiec, Maciej Francikiewicz","doi":"10.1007/978-3-319-65127-9_24","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_24","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130657627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile 满足安全软件开发标准的要求,同时保持敏捷性
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_1
J. Górski, Katarzyna Lukasiewicz
{"title":"Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile","authors":"J. Górski, Katarzyna Lukasiewicz","doi":"10.1007/978-3-319-65127-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_1","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models 适应不断发展的云处理和网络模型的企业安全方法
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_2
A. Hutchison
{"title":"Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models","authors":"A. Hutchison","doi":"10.1007/978-3-319-65127-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_2","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Race Condition Faults in Multi-core Systems 多核系统中的竞争条件故障
Mathematical Methods, Models, and Architectures for Network Security Systems Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_9
L. Popyack, J. Biernat
{"title":"Race Condition Faults in Multi-core Systems","authors":"L. Popyack, J. Biernat","doi":"10.1007/978-3-319-65127-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_9","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信