ISCIS Security Workshop Euro-CYBERSEC最新文献

筛选
英文 中文
KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System KONFIDO:一个基于openncp的安全电子健康数据交换系统
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_2
M. Staffa, L. Coppolino, Luigi Sgaglione, E. Gelenbe, Ioannis Komnios, E. Grivas, Oana Stan, Luigi Castaldo
{"title":"KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System","authors":"M. Staffa, L. Coppolino, Luigi Sgaglione, E. Gelenbe, Ioannis Komnios, E. Grivas, Oana Stan, Luigi Castaldo","doi":"10.1007/978-3-319-95189-8_2","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_2","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards a Mobile Malware Detection Framework with the Support of Machine Learning 基于机器学习的移动恶意软件检测框架
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_11
D. Geneiatakis, G. Baldini, I. N. Fovino, I. Vakalis
{"title":"Towards a Mobile Malware Detection Framework with the Support of Machine Learning","authors":"D. Geneiatakis, G. Baldini, I. N. Fovino, I. Vakalis","doi":"10.1007/978-3-319-95189-8_11","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_11","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Building an Ethical Framework for Cross-Border Applications: The KONFIDO Project 建立跨境应用的道德框架:KONFIDO项目
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_4
G. Faiella, Ioannis Komnios, Maja Voss-Knude, Isaac Cano, P. Duquenoy, M. Nalin, I. Baroni, Flavia Matrisciano, F. Clemente
{"title":"Building an Ethical Framework for Cross-Border Applications: The KONFIDO Project","authors":"G. Faiella, Ioannis Komnios, Maja Voss-Knude, Isaac Cano, P. Duquenoy, M. Nalin, I. Baroni, Flavia Matrisciano, F. Clemente","doi":"10.1007/978-3-319-95189-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_4","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Blockchain-Based Logging for the Cross-Border Exchange of eHealth Data in Europe 基于区块链的欧洲电子健康数据跨境交换日志
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_5
Luigi Castaldo, Vincenzo Cinque
{"title":"Blockchain-Based Logging for the Cross-Border Exchange of eHealth Data in Europe","authors":"Luigi Castaldo, Vincenzo Cinque","doi":"10.1007/978-3-319-95189-8_5","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_5","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments 基于密集随机神经网络的深度学习检测针对物联网家庭环境的攻击
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_8
O. Brun, Yonghua Yin, E. Gelenbe, Yasin Murat Kadioglu, J. Augusto-Gonzalez, Manuel Ramos
{"title":"Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments","authors":"O. Brun, Yonghua Yin, E. Gelenbe, Yasin Murat Kadioglu, J. Augusto-Gonzalez, Manuel Ramos","doi":"10.1007/978-3-319-95189-8_8","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_8","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Some Current Cybersecurity Research in Europe 当前欧洲网络安全研究现状
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_1
M. Çaglayan
{"title":"Some Current Cybersecurity Research in Europe","authors":"M. Çaglayan","doi":"10.1007/978-3-319-95189-8_1","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_1","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Blockchains to Strengthen the Security of Internet of Things 利用区块链加强物联网安全
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_9
C. Kouzinopoulos, G. Spathoulas, K. M. Giannoutakis, K. Votis, Pankaj Pandey, D. Tzovaras, S. Katsikas, A. Collen, N. A. Nijdam
{"title":"Using Blockchains to Strengthen the Security of Internet of Things","authors":"C. Kouzinopoulos, G. Spathoulas, K. M. Giannoutakis, K. Votis, Pankaj Pandey, D. Tzovaras, S. Katsikas, A. Collen, N. A. Nijdam","doi":"10.1007/978-3-319-95189-8_9","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_9","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114990016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Problem Domain Analysis of IoT-Driven Secure Data Markets 物联网驱动的安全数据市场问题域分析
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_6
Máté Horváth, L. Buttyán
{"title":"Problem Domain Analysis of IoT-Driven Secure Data Markets","authors":"Máté Horváth, L. Buttyán","doi":"10.1007/978-3-319-95189-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_6","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125714407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project 物联网安全研究与创新行动:SerIoT项目
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_10
J. Domańska, E. Gelenbe, T. Czachórski, A. Drosou, D. Tzovaras
{"title":"Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project","authors":"J. Domańska, E. Gelenbe, T. Czachórski, A. Drosou, D. Tzovaras","doi":"10.1007/978-3-319-95189-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_10","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control GHOST -具有个性化实时风险控制的安全保护家庭物联网环境
ISCIS Security Workshop Euro-CYBERSEC Pub Date : 2018-02-26 DOI: 10.1007/978-3-319-95189-8_7
A. Collen, N. A. Nijdam, J. Augusto-Gonzalez, S. Katsikas, K. M. Giannoutakis, G. Spathoulas, E. Gelenbe, K. Votis, D. Tzovaras, Navid Ghavami, M. Volkamer, P. Haller, Alvaro Sánchez, Miltiadis Dimas
{"title":"GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control","authors":"A. Collen, N. A. Nijdam, J. Augusto-Gonzalez, S. Katsikas, K. M. Giannoutakis, G. Spathoulas, E. Gelenbe, K. Votis, D. Tzovaras, Navid Ghavami, M. Volkamer, P. Haller, Alvaro Sánchez, Miltiadis Dimas","doi":"10.1007/978-3-319-95189-8_7","DOIUrl":"https://doi.org/10.1007/978-3-319-95189-8_7","url":null,"abstract":"","PeriodicalId":424763,"journal":{"name":"ISCIS Security Workshop Euro-CYBERSEC","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126598911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信