Foundations and Practice of Security最新文献

筛选
英文 中文
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks 基于神经网络的隐私保护心律失常分类
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_1
Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis
{"title":"PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks","authors":"Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis","doi":"10.1007/978-3-030-45371-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles 使用机器学习检测重型车辆嵌入式网络中的异常
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_3
H. Shirazi, I. Ray, Charles Anderson
{"title":"Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles","authors":"H. Shirazi, I. Ray, Charles Anderson","doi":"10.1007/978-3-030-45371-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_3","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134293235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications 基于拒绝的Web应用中SQL注入漏洞检测方法
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_26
Lalia Saoudi, K. Adi, Younes Boudraa
{"title":"A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications","authors":"Lalia Saoudi, K. Adi, Younes Boudraa","doi":"10.1007/978-3-030-45371-8_26","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_26","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control 将离线属性委托纳入分层组和基于属性的访问控制
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_15
Daniel Servos, M. Bauer
{"title":"Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control","authors":"Daniel Servos, M. Bauer","doi":"10.1007/978-3-030-45371-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS 基于随机输入输出的抗压缩侧信道攻击的Lempel-Ziv压缩
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_8
Meng Yang, G. Gong
{"title":"Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS","authors":"Meng Yang, G. Gong","doi":"10.1007/978-3-030-45371-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_8","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Command Dependencies in Heuristic Safety Analysis of Access Control Models 访问控制模型启发式安全分析中的命令依赖关系
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_13
Peter Amthor, M. Rabe
{"title":"Command Dependencies in Heuristic Safety Analysis of Access Control Models","authors":"Peter Amthor, M. Rabe","doi":"10.1007/978-3-030-45371-8_13","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121657652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis of Auctionity: A Blockchain Based E-Auction 拍卖的安全性分析:基于区块链的电子拍卖
Foundations and Practice of Security Pub Date : 2019-11-01 DOI: 10.1007/978-3-030-45371-8_18
P. Lafourcade, Mike Nopere, Jérémy Picot, D. Pizzuti, Etienne Roudeix
{"title":"Security Analysis of Auctionity: A Blockchain Based E-Auction","authors":"P. Lafourcade, Mike Nopere, Jérémy Picot, D. Pizzuti, Etienne Roudeix","doi":"10.1007/978-3-030-45371-8_18","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_18","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure Logging with Security against Adaptive Crash Attack 安全日志与安全的自适应崩溃攻击
Foundations and Practice of Security Pub Date : 2019-10-30 DOI: 10.1007/978-3-030-45371-8_9
S. Avizheh, R. Safavi-Naini, Shuai Li
{"title":"Secure Logging with Security against Adaptive Crash Attack","authors":"S. Avizheh, R. Safavi-Naini, Shuai Li","doi":"10.1007/978-3-030-45371-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples 通过生成对抗样本逃避深度神经网络和随机森林分类器
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_10
Erick Martínez, Bella Oh, Feng Li, Xiao Luo
{"title":"Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples","authors":"Erick Martínez, Bella Oh, Feng Li, Xiao Luo","doi":"10.1007/978-3-030-18419-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
When Fault Injection Collides with Hardware Complexity 当故障注入与硬件复杂度冲突时
Foundations and Practice of Security Pub Date : 2018-11-13 DOI: 10.1007/978-3-030-18419-3_16
Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet
{"title":"When Fault Injection Collides with Hardware Complexity","authors":"Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet","doi":"10.1007/978-3-030-18419-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-18419-3_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131734017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信