Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings /

Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / [electronic resource] : edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski. - 1st ed. 2017. - XIII, 362 p. 141 illus. online resource. - Computer Communication Networks and Telecommunications, 10446 2945-9184 ; . - Computer Communication Networks and Telecommunications, 10446 .

Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security.

This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.

9783319651279

10.1007/978-3-319-65127-9 doi


Data protection.
Computer networks .
Computers and civilization.
Computers--Law and legislation.
Information technology--Law and legislation.
Cryptography.
Data encryption (Computer science).
Electronic digital computers--Evaluation.
Data and Information Security.
Computer Communication Networks.
Computers and Society.
Legal Aspects of Computing.
Cryptology.
System Performance and Evaluation.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in