Security in Computer and Information Sciences
portes grátis
Security in Computer and Information Sciences
Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers
Marton, Anna; Gelenbe, Erol; Kehagias, Dionysios; Vilmos, Andras; Jankovic, Marija
Springer International Publishing AG
07/2022
133
Mole
Inglês
9783031093562
15 a 20 dias
238
Descrição não disponível.
AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results.- Application of a Human-Centric Approach in Security by Design for IoT Architecture Development.- An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction.- Correlation-based Anomaly Detection for the CAN Bus.- Botnet Attack Detection with Incremental Online Learning.- Optimizing Energy Usage for an Electric Drone.- T-RAID: TEE-based Remote Attestation for IoT Devices.- Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints.- Energy, QoS and Security Aware Services at the Edge.- Mitigating the Massive Access Problem in the IoT.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
architecture types;artificial intelligence;communication systems;computer crime;computer hardware;computer networks;computer security;computer systems;cryptography;data security;Internet of Things (IoT);network protocols;network security;signal processing;software architecture;software design;software engineering;telecommunication networks;telecommunication systems
AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results.- Application of a Human-Centric Approach in Security by Design for IoT Architecture Development.- An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction.- Correlation-based Anomaly Detection for the CAN Bus.- Botnet Attack Detection with Incremental Online Learning.- Optimizing Energy Usage for an Electric Drone.- T-RAID: TEE-based Remote Attestation for IoT Devices.- Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints.- Energy, QoS and Security Aware Services at the Edge.- Mitigating the Massive Access Problem in the IoT.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
architecture types;artificial intelligence;communication systems;computer crime;computer hardware;computer networks;computer security;computer systems;cryptography;data security;Internet of Things (IoT);network protocols;network security;signal processing;software architecture;software design;software engineering;telecommunication networks;telecommunication systems