PICK&READ
Bonjour !
Connectez-vous pour afficher vos livres, identifier ceux en cours de lecture ou déjà lus
Pas encore de compte ?
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book.The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been...
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications.This book is organized into five parts with a total of 15 chapters. Each area corresponds to an...
This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book...
?This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is...
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.This book also presents the latest fundamental research results toward understanding proactive and...
This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber...
This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new...
This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive...
En poursuivant votre navigation, vous acceptez l'utilisation de cookies qui permettront notamment de vous offrir contenus, services, et publicités liés à vos centres d'intérêt.