ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)最新文献

筛选
英文 中文
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring 动态自编码器的上下文异常检测应用于安全监控
Alexandre Dey, Eric Totel, Benjamin Costé
{"title":"DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring","authors":"Alexandre Dey, Eric Totel, Benjamin Costé","doi":"10.1007/978-3-031-06975-8_4","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_4","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76558677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay 解剖学家:基于程序状态异常检测和全系统重放的增强固件漏洞发现
Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye
{"title":"Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay","authors":"Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye","doi":"10.1007/978-3-031-22390-7_23","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_23","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87626884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Circuit Lifetimes in Tor Tor中电路寿命的评估
Kevin Köster, Matthias Marx, Anne Kunstmann, H. Federrath
{"title":"Evaluation of Circuit Lifetimes in Tor","authors":"Kevin Köster, Matthias Marx, Anne Kunstmann, H. Federrath","doi":"10.1007/978-3-031-06975-8_9","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_9","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90231595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing 基于自适应位压缩感知的高效通信安全联邦学习
Di Xiao, Xue Tan, Min Li
{"title":"Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing","authors":"Di Xiao, Xue Tan, Min Li","doi":"10.1007/978-3-031-22390-7_29","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_29","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83082317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones 双x:智能手机双交叉解锁机制
Wenjuan Li, J. Tan, Nan Zhu
{"title":"Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones","authors":"Wenjuan Li, J. Tan, Nan Zhu","doi":"10.1007/978-3-031-06975-8_24","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_24","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79678410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAPredict: Static Analysis Driven Memory Access Prediction Framework for Modern CPUs mappredict:现代cpu的静态分析驱动内存访问预测框架
Mohammad Alaul Haque Monil, Seyong Lee, J. Vetter, A. Malony
{"title":"MAPredict: Static Analysis Driven Memory Access Prediction Framework for Modern CPUs","authors":"Mohammad Alaul Haque Monil, Seyong Lee, J. Vetter, A. Malony","doi":"10.1007/978-3-031-07312-0_12","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_12","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88464756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Evaluation of Call Graph Generation by Profiling Tools 用分析工具生成呼叫图的比较评价
Onur Cankur, A. Bhatele
{"title":"Comparative Evaluation of Call Graph Generation by Profiling Tools","authors":"Onur Cankur, A. Bhatele","doi":"10.1007/978-3-031-07312-0_11","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_11","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79341522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings 信息安全-第25届国际会议,ISC 2022,巴厘岛,印度尼西亚,12月18-22日,2022,会议录
{"title":"Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings","authors":"","doi":"10.1007/978-3-031-22390-7","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83972952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition 基于方面增强深度神经网络的入侵识别可操作指标
Shaofeng Wang, B. Lang, N. Xiao, Yikai Chen
{"title":"AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition","authors":"Shaofeng Wang, B. Lang, N. Xiao, Yikai Chen","doi":"10.1007/978-3-031-22390-7_24","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_24","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85875698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization 藤崎-冈本的内隐拒绝:框架与新实现
Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li
{"title":"Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization","authors":"Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li","doi":"10.1007/978-3-031-22390-7_8","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_8","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77685405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信