000 | 04510nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-22295-5 | ||
003 | DE-He213 | ||
005 | 20240730165840.0 | ||
007 | cr nn 008mamaa | ||
008 | 221223s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031222955 _9978-3-031-22295-5 |
||
024 | 7 |
_a10.1007/978-3-031-22295-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecure IT Systems _h[electronic resource] : _b27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings / _cedited by Hans P. Reiser, Marcel Kyas. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXIII, 388 p. 110 illus., 86 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13700 |
|
505 | 0 | _aOn the Effectiveness of Intersection Attacks in Anonymous Microblogging -- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement -- Location Privacy, 5G AKA, and Enhancements -- Local Differential Privacy for Private Construction of Classification Algorithms -- IMSI Probing: Possibilities and Limitations -- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto: Finding Cryptocurrency Miners on ISP networks -- Detection of Voice Conversion Spoofing Attacks using Voiced Speech -- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries -- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans -- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage -- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models -- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs -- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation -- Malware Analysis with Symbolic Execution and Graph Kernel -- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices -- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data -- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response. | |
520 | _aThis book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aApplication software. _990862 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aDatabase Management System. _932540 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _990863 |
650 | 2 | 4 |
_aComputer Communication Networks. _990864 |
700 | 1 |
_aReiser, Hans P. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990865 |
|
700 | 1 |
_aKyas, Marcel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990866 |
|
710 | 2 |
_aSpringerLink (Online service) _990867 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031222948 |
776 | 0 | 8 |
_iPrinted edition: _z9783031222962 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13700 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-22295-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86575 _d86575 |