Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / [electronic resource] :
edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro.
- 1st ed. 2017.
- XIII, 361 p. 83 illus. online resource.
- Security and Cryptology, 10128 2946-1863 ; .
- Security and Cryptology, 10128 .
Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.
9783319519661
10.1007/978-3-319-51966-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Coding theory.
Information theory.
Computer networks .
Biometric identification.
Algorithms.
Cryptology.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Biometrics.
Algorithms.
QA268
005.824
Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.
9783319519661
10.1007/978-3-319-51966-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Coding theory.
Information theory.
Computer networks .
Biometric identification.
Algorithms.
Cryptology.
Data and Information Security.
Coding and Information Theory.
Computer Communication Networks.
Biometrics.
Algorithms.
QA268
005.824