000 05067nam a22006375i 4500
001 978-3-030-45371-8
003 DE-He213
005 20240423125214.0
007 cr nn 008mamaa
008 200402s2020 sz | s |||| 0|eng d
020 _a9783030453718
_9978-3-030-45371-8
024 7 _a10.1007/978-3-030-45371-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aFoundations and Practice of Security
_h[electronic resource] :
_b12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers /
_cedited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXIII, 408 p. 153 illus., 68 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12056
505 0 _aMachine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
520 _aThis book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.
650 0 _aData protection.
650 0 _aDatabase management.
650 0 _aComputer networks .
650 0 _aArtificial intelligence.
650 1 4 _aData and Information Security.
650 2 4 _aDatabase Management System.
650 2 4 _aComputer Communication Networks.
650 2 4 _aArtificial Intelligence.
700 1 _aBenzekri, Abdelmalek.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBarbeau, Michel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGong, Guang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLaborde, Romain.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030453701
776 0 8 _iPrinted edition:
_z9783030453725
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12056
856 4 0 _uhttps://doi.org/10.1007/978-3-030-45371-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c175408
_d175408