Foundations and Practice of Security最新文献

筛选
英文 中文
Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection 消灭勒索软件——一种Android勒索软件检测的混合方法
Foundations and Practice of Security Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_16
A. Ferrante, M. Malek, F. Martinelli, F. Mercaldo, Jelena Milosevic
{"title":"Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection","authors":"A. Ferrante, M. Malek, F. Martinelli, F. Mercaldo, Jelena Milosevic","doi":"10.1007/978-3-319-75650-9_16","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Monitoring of Security Properties Using BeepBeep 使用BeepBeep监控安全属性
Foundations and Practice of Security Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_11
Mohamed Recem Boussaha, R. Khoury, Sylvain Hallé
{"title":"Monitoring of Security Properties Using BeepBeep","authors":"Mohamed Recem Boussaha, R. Khoury, Sylvain Hallé","doi":"10.1007/978-3-319-75650-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_11","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization 通过层内优化,更轻量,更强的802.15.4安全性
Foundations and Practice of Security Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_12
Konrad-Felix Krentz, C. Meinel, Hendrik Graupner
{"title":"More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization","authors":"Konrad-Felix Krentz, C. Meinel, Hendrik Graupner","doi":"10.1007/978-3-319-75650-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generation of Applicative Attacks Scenarios Against Industrial Systems 工业系统应用攻击场景的生成
Foundations and Practice of Security Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_9
Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled
{"title":"Generation of Applicative Attacks Scenarios Against Industrial Systems","authors":"Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled","doi":"10.1007/978-3-319-75650-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks 分散在线社交网络中基于关系的再分享访问控制
Foundations and Practice of Security Pub Date : 2017-10-23 DOI: 10.1007/978-3-319-75650-9_2
Richard Gay, Jinwei Hu, H. Mantel, Sogol Mazaheri
{"title":"Relationship-Based Access Control for Resharing in Decentralized Online Social Networks","authors":"Richard Gay, Jinwei Hu, H. Mantel, Sogol Mazaheri","doi":"10.1007/978-3-319-75650-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_2","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"10 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120969950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Formal Analysis of Combinations of Secure Protocols 安全协议组合的形式分析
Foundations and Practice of Security Pub Date : 2017-07-10 DOI: 10.1007/978-3-319-75650-9_4
Elliott Blot, Jannik Dreier, P. Lafourcade
{"title":"Formal Analysis of Combinations of Secure Protocols","authors":"Elliott Blot, Jannik Dreier, P. Lafourcade","doi":"10.1007/978-3-319-75650-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-75650-9_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantically Non-preserving Transformations for Antivirus Evaluation 反病毒评估的语义非保留转换
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_18
Erkan Ersan, Lior Malka, B. Kapron
{"title":"Semantically Non-preserving Transformations for Antivirus Evaluation","authors":"Erkan Ersan, Lior Malka, B. Kapron","doi":"10.1007/978-3-319-51966-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_18","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126078845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhancement of Privacy-Preserving Wildcards Pattern Matching 保护隐私的通配符模式匹配的改进
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_10
T. Saha, Takeshi Koshiba
{"title":"An Enhancement of Privacy-Preserving Wildcards Pattern Matching","authors":"T. Saha, Takeshi Koshiba","doi":"10.1007/978-3-319-51966-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Function Classification for the Retro-Engineering of Malwares 恶意软件逆向工程的功能分类
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_16
Guillaume Bonfante, Julien Oury Nogues
{"title":"Function Classification for the Retro-Engineering of Malwares","authors":"Guillaume Bonfante, Julien Oury Nogues","doi":"10.1007/978-3-319-51966-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123669336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Mitigation by Data Structure Randomization 通过数据结构随机化缓解攻击
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_6
Zhongtian Chen, Hao Han
{"title":"Attack Mitigation by Data Structure Randomization","authors":"Zhongtian Chen, Hao Han","doi":"10.1007/978-3-319-51966-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122140004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信