Foundations and Practice of Security最新文献

筛选
英文 中文
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes MalProfiler:自动和有效的分类行为类Android恶意应用程序
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_1
Antonio La Marra, F. Martinelli, A. Saracino, M. Alishahi
{"title":"MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes","authors":"Antonio La Marra, F. Martinelli, A. Saracino, M. Alishahi","doi":"10.1007/978-3-319-51966-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Criteria Recommender Approach for Supporting Intrusion Response System 支持入侵响应系统的多准则推荐方法
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_4
Tarek Bouyahia, N. Cuppens-Boulahia, F. Cuppens, F. Autrel
{"title":"Multi-Criteria Recommender Approach for Supporting Intrusion Response System","authors":"Tarek Bouyahia, N. Cuppens-Boulahia, F. Cuppens, F. Autrel","doi":"10.1007/978-3-319-51966-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Analysis of WirelessHART Communication Scheme 无线shart通信方案的安全性分析
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_15
Lyes Bayou, D. Espès, N. Cuppens-Boulahia, F. Cuppens
{"title":"Security Analysis of WirelessHART Communication Scheme","authors":"Lyes Bayou, D. Espès, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1007/978-3-319-51966-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115782672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Three Views of Log Trace Triaging 日志跟踪分类的三个视图
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_12
R. Khoury, S. Gaboury, Sylvain Hallé
{"title":"Three Views of Log Trace Triaging","authors":"R. Khoury, S. Gaboury, Sylvain Hallé","doi":"10.1007/978-3-319-51966-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121500203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach 迈向侧通道安全固件更新-一种极简的异常检测方法
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_23
O. Guillen, F. D. Santis, R. Brederlow, G. Sigl
{"title":"Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach","authors":"O. Guillen, F. D. Santis, R. Brederlow, G. Sigl","doi":"10.1007/978-3-319-51966-1_23","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_23","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anonymizable Ring Signature Without Pairing 无需配对的匿名环签名
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_14
Olivier Blazy, Xavier Bultel, P. Lafourcade
{"title":"Anonymizable Ring Signature Without Pairing","authors":"Olivier Blazy, Xavier Bultel, P. Lafourcade","doi":"10.1007/978-3-319-51966-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Analysis of Software Defined Networking 软件定义网络的漏洞分析
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_7
Salaheddine Zerkane, D. Espès, P. L. Parc, F. Cuppens
{"title":"Vulnerability Analysis of Software Defined Networking","authors":"Salaheddine Zerkane, D. Espès, P. L. Parc, F. Cuppens","doi":"10.1007/978-3-319-51966-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards Metric-Driven, Application-Specific Visualization of Attack Graphs 面向度量驱动的、特定于应用程序的攻击图可视化
Foundations and Practice of Security Pub Date : 2016-10-24 DOI: 10.1007/978-3-319-51966-1_8
Mickael Emirkanian-Bouchard, Lingyu Wang
{"title":"Towards Metric-Driven, Application-Specific Visualization of Attack Graphs","authors":"Mickael Emirkanian-Bouchard, Lingyu Wang","doi":"10.1007/978-3-319-51966-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-51966-1_8","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121614748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AndroSSL: A Platform to Test Android Applications Connection Security AndroSSL:一个测试Android应用连接安全性的平台
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_20
F. Gagnon, Marc-Antoine Ferland, M. Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau
{"title":"AndroSSL: A Platform to Test Android Applications Connection Security","authors":"F. Gagnon, Marc-Antoine Ferland, M. Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau","doi":"10.1007/978-3-319-30303-1_20","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_20","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131785984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective 从检测器的角度仔细观察基于HTTP和P2P的僵尸网络
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_13
Fariba Haddadi, A. N. Zincir-Heywood
{"title":"A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective","authors":"Fariba Haddadi, A. N. Zincir-Heywood","doi":"10.1007/978-3-319-30303-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信