Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949419933802882
    Format: XIII, 388 p. 110 illus., 86 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9783031222955
    Series Statement: Lecture Notes in Computer Science, 13700
    Content: This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
    Note: On the Effectiveness of Intersection Attacks in Anonymous Microblogging -- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement -- Location Privacy, 5G AKA, and Enhancements -- Local Differential Privacy for Private Construction of Classification Algorithms -- IMSI Probing: Possibilities and Limitations -- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto: Finding Cryptocurrency Miners on ISP networks -- Detection of Voice Conversion Spoofing Attacks using Voiced Speech -- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries -- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans -- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage -- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models -- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs -- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation -- Malware Analysis with Symbolic Execution and Graph Kernel -- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices -- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data -- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031222948
    Additional Edition: Printed edition: ISBN 9783031222962
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages