ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)最新文献

筛选
英文 中文
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage D-Cloud-Collector:来自移动云存储的可接受的法医证据
Mark Vella, C. Colombo
{"title":"D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage","authors":"Mark Vella, C. Colombo","doi":"10.1007/978-3-031-06975-8_10","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_10","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78796380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating MPI All-to-All Communication with Online Compression on Modern GPU Clusters 在现代GPU集群上通过在线压缩加速MPI全对全通信
Qinghua Zhou, Pouya Kousha, Quentin G. Anthony, Kawthar Shafie Khorassani, A. Shafi, H. Subramoni, D. Panda
{"title":"Accelerating MPI All-to-All Communication with Online Compression on Modern GPU Clusters","authors":"Qinghua Zhou, Pouya Kousha, Quentin G. Anthony, Kawthar Shafie Khorassani, A. Shafi, H. Subramoni, D. Panda","doi":"10.1007/978-3-031-07312-0_1","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_1","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77543820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions 基于深度可分离卷积的轻量级文件片段分类
K. Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem
{"title":"Light-Weight File Fragments Classification Using Depthwise Separable Convolutions","authors":"K. Saaim, Muhamad Felemban, Saleh Alsaleh, Ahmad Almulhem","doi":"10.1007/978-3-031-06975-8_12","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_12","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91500712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature CryptKSP:一种基于AES-NI硬件特征的内核堆栈保护模型
Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng
{"title":"CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature","authors":"Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng","doi":"10.1007/978-3-031-06975-8_16","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_16","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91519968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dissecting Applications Uninstallers and Removers: Are They Effective? 剖析应用程序卸载程序和删除程序:它们有效吗?
Marcus Botacin, A. Grégio
{"title":"Dissecting Applications Uninstallers and Removers: Are They Effective?","authors":"Marcus Botacin, A. Grégio","doi":"10.1007/978-3-031-22390-7_20","DOIUrl":"https://doi.org/10.1007/978-3-031-22390-7_20","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76979250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps AndroClonium:字节码级代码克隆检测混淆Android应用程序
Ardalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany
{"title":"AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps","authors":"Ardalan Foroughipour, Natalia Stakhanova, Farzaneh Abazari, Bahman Sistany","doi":"10.1007/978-3-031-06975-8_22","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_22","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88846130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usability of Antivirus Tools in a Threat Detection Scenario 威胁检测场景下防病毒工具的可用性
Michael Körber, Anatoli Kalysch, Werner Massonne, Z. Benenson
{"title":"Usability of Antivirus Tools in a Threat Detection Scenario","authors":"Michael Körber, Anatoli Kalysch, Werner Massonne, Z. Benenson","doi":"10.1007/978-3-031-06975-8_18","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_18","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74986793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hy-Fi: Hybrid Five-Dimensional Parallel DNN Training on High-Performance GPU Clusters Hy-Fi:高性能GPU集群上的混合五维并行DNN训练
Arpan Jain, A. Shafi, Quentin G. Anthony, Pouya Kousha, H. Subramoni, D. Panda
{"title":"Hy-Fi: Hybrid Five-Dimensional Parallel DNN Training on High-Performance GPU Clusters","authors":"Arpan Jain, A. Shafi, Quentin G. Anthony, Pouya Kousha, H. Subramoni, D. Panda","doi":"10.1007/978-3-031-07312-0_6","DOIUrl":"https://doi.org/10.1007/978-3-031-07312-0_6","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74988941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Greedy Networking in Cryptocurrency Blockchain 加密货币区块链中的贪婪网络
Simeon Wuthier, P. Chandramouli, Xiaobo Zhou, Sang-Yoon Chang
{"title":"Greedy Networking in Cryptocurrency Blockchain","authors":"Simeon Wuthier, P. Chandramouli, Xiaobo Zhou, Sang-Yoon Chang","doi":"10.1007/978-3-031-06975-8_20","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_20","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79029656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals 重点:基于频率的隐蔽超声信号检测
Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen, N. Mentens
{"title":"FOCUS: Frequency Based Detection of Covert Ultrasonic Signals","authors":"Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen, N. Mentens","doi":"10.1007/978-3-031-06975-8_5","DOIUrl":"https://doi.org/10.1007/978-3-031-06975-8_5","url":null,"abstract":"","PeriodicalId":92039,"journal":{"name":"ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89435943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信