Matokeo ya Utafutaji
-
Preserving Privacy Against Side-Channel Leaks
by Lingyu Wang • Wen Ming LiuThis book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic ... More
Language: ENGHakimiliki: 2016 -
Network Hardening
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means ... More
Language: ENGHakimiliki: 2014 -
Network Security Metrics
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve w... More
Language: ENGHakimiliki: 2017 -
Foundations and Practice of Security
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short... More
Language: ENGHakimiliki: 2012 -
Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11605)
by Lingyu Wang • Jianying Zhou • Zhou Li • Robert Deng • Weizhi Meng • Suryadipta Majumdar • Kehuan ZhangThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. ... More
Language: ENGHakimiliki: 2019 -
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting (Advances in Information Security #78)
by He Huang • Lingyu Wang • Mourad Debbabi • Amr Youssef • Djedjiga Mouheb • Saed Alrabaee • Paria Shirani • Ashkan Rahimian • Lina Nouh • Aiman HannaThis book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerabili... More
Language: ENGHakimiliki: 2020