A systems approach to cyber security :: proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) /
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press B.V.,
[2017]
|
Schriftenreihe: | Cryptology and information security series ;
v. 15. |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (x, 161 pages) : illustrations |
Bibliographie: | Includes bibliographical references and indexes. |
ISBN: | 9781614997443 1614997446 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn993700410 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 170714t20172017ne a ob 101 0 eng d | ||
040 | |a IOSPR |b eng |e rda |e pn |c IOSPR |d OCLCA |d NAM |d YDX |d N$T |d IDEBK |d VT2 |d AU@ |d CUS |d G3B |d IGB |d STF |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 1013503670 |a 1048103553 | ||
020 | |a 9781614997443 |q (electronic bk.) | ||
020 | |a 1614997446 |q (electronic bk.) | ||
020 | |z 9781614997436 |q (print) | ||
020 | |z 1614997438 | ||
035 | |a (OCoLC)993700410 |z (OCoLC)1013503670 |z (OCoLC)1048103553 | ||
037 | |a 9781614997443 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a QA76.9.A25 |b C9186 2017eb | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
111 | 2 | |a Singapore Cyber-Security R & D Conference |n (2nd : |d 2017 : |c Singapore) | |
245 | 1 | 2 | |a A systems approach to cyber security : |b proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / |c edited by Abhik Roychoudhury and Yang Liu. |
264 | 1 | |a Amsterdam : |b IOS Press B.V., |c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 online resource (x, 161 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series ; |v volume 15 | |
504 | |a Includes bibliographical references and indexes. | ||
588 | 0 | |a Print version record. | |
505 | 0 | 0 | |t Designing Security-Aware Architectures and Systems / |r RubyB. Lee -- |t Verification of Security Protocols and the Secrecy Problem / |r Luke Ong -- |t Let's Stick Together: Digitally Ensuring Physical Proximity / |r Sjouke Mauw -- |t Chat-App Decryption Key Extraction Through Information Flow Analysis / |r Zhongmin Dai, Sufatrio, Tong-Wei Chua, Dinesh Kumar Balakrishnan and Vrizlynn L.L. Thing -- |t VeriFormal: An Executable Formal Model of a Hardware Description Language / |r Wilayat Khan, A/wen Tiu and David Sanan -- |t Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach / |r Matthew Smith and Elisabeth Pate-Cornell -- |t A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification / |r Victor Pomponiu and Vrizlynn L.L. Thing -- |t Mind the Gap: Security Analysis of Metro Platform Screen Door System / |r Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong and Jianying Zhou -- |t Attribute-Based Secure Messaging in the Public Cloud / |r Zhi Yuan Poh, Hui Cui, Robert H Deng and Yingjiu Li -- |t Faster ECC over F / |r (feat. PMULL) / |r Hwajung Seo -- |t Scholarly Digital Libraries as a Platform for Mal ware Distribution / |r Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Liar Rokach, Yuval Elovici and Lee Giles -- |t Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification / |r Chien Eao Lee, Lilei Zheng, Ying Zhang and Vrizlynn L.L. Thing -- |t Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs / |r G. Sumathi, L Srivani, D. Thirugnana Murthy, Anish Kumar and K Madhusoodanan. |
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Internet |x Security measures |v Congresses. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Internet |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Roychoudhury, Abhik, |e editor. |0 http://id.loc.gov/authorities/names/n2009016159 | |
700 | 1 | |a Liu, Yang, |e editor. | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a A systems approach to cyber security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGpbVW43PmPffHPvJbQM8y |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Singapore Cyber-Security R & D Conference (2nd : 2017 : Singapore). |t Systems approach to cyber security |z 9781614997436 |w (OCoLC)973917842 |
830 | 0 | |a Cryptology and information security series ; |v v. 15. |0 http://id.loc.gov/authorities/names/no2008086431 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640393 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1640393 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis39532436 | ||
938 | |a YBP Library Services |b YANK |n 15009580 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn993700410 |
---|---|
_version_ | 1816882394906492928 |
adam_text | |
any_adam_object | |
author2 | Roychoudhury, Abhik Liu, Yang |
author2_role | edt edt |
author2_variant | a r ar y l yl |
author_GND | http://id.loc.gov/authorities/names/n2009016159 |
author_additional | RubyB. Lee -- Luke Ong -- Sjouke Mauw -- Zhongmin Dai, Sufatrio, Tong-Wei Chua, Dinesh Kumar Balakrishnan and Vrizlynn L.L. Thing -- Wilayat Khan, A/wen Tiu and David Sanan -- Matthew Smith and Elisabeth Pate-Cornell -- Victor Pomponiu and Vrizlynn L.L. Thing -- Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong and Jianying Zhou -- Zhi Yuan Poh, Hui Cui, Robert H Deng and Yingjiu Li -- (feat. PMULL) / Hwajung Seo -- Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Liar Rokach, Yuval Elovici and Lee Giles -- Chien Eao Lee, Lilei Zheng, Ying Zhang and Vrizlynn L.L. Thing -- G. Sumathi, L Srivani, D. Thirugnana Murthy, Anish Kumar and K Madhusoodanan. |
author_corporate | Singapore Cyber-Security R & D Conference Singapore IOS Press |
author_corporate_role | |
author_facet | Roychoudhury, Abhik Liu, Yang Singapore Cyber-Security R & D Conference Singapore IOS Press |
author_sort | Singapore Cyber-Security R & D Conference Singapore |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C9186 2017eb |
callnumber-search | QA76.9.A25 C9186 2017eb |
callnumber-sort | QA 276.9 A25 C9186 42017EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Designing Security-Aware Architectures and Systems / Verification of Security Protocols and the Secrecy Problem / Let's Stick Together: Digitally Ensuring Physical Proximity / Chat-App Decryption Key Extraction Through Information Flow Analysis / VeriFormal: An Executable Formal Model of a Hardware Description Language / Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach / A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification / Mind the Gap: Security Analysis of Metro Platform Screen Door System / Attribute-Based Secure Messaging in the Public Cloud / Faster ECC over F / Scholarly Digital Libraries as a Platform for Mal ware Distribution / Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification / Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs / |
ctrlnum | (OCoLC)993700410 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04486cam a2200613 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn993700410</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">170714t20172017ne a ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">OCLCA</subfield><subfield code="d">NAM</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">VT2</subfield><subfield code="d">AU@</subfield><subfield code="d">CUS</subfield><subfield code="d">G3B</subfield><subfield code="d">IGB</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1013503670</subfield><subfield code="a">1048103553</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614997443</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614997446</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614997436</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1614997438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)993700410</subfield><subfield code="z">(OCoLC)1013503670</subfield><subfield code="z">(OCoLC)1048103553</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781614997443</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C9186 2017eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Singapore Cyber-Security R & D Conference</subfield><subfield code="n">(2nd :</subfield><subfield code="d">2017 :</subfield><subfield code="c">Singapore)</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A systems approach to cyber security :</subfield><subfield code="b">proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) /</subfield><subfield code="c">edited by Abhik Roychoudhury and Yang Liu.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press B.V.,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 161 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">volume 15</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Designing Security-Aware Architectures and Systems /</subfield><subfield code="r">RubyB. Lee --</subfield><subfield code="t">Verification of Security Protocols and the Secrecy Problem /</subfield><subfield code="r">Luke Ong --</subfield><subfield code="t">Let's Stick Together: Digitally Ensuring Physical Proximity /</subfield><subfield code="r">Sjouke Mauw --</subfield><subfield code="t">Chat-App Decryption Key Extraction Through Information Flow Analysis /</subfield><subfield code="r">Zhongmin Dai, Sufatrio, Tong-Wei Chua, Dinesh Kumar Balakrishnan and Vrizlynn L.L. Thing --</subfield><subfield code="t">VeriFormal: An Executable Formal Model of a Hardware Description Language /</subfield><subfield code="r">Wilayat Khan, A/wen Tiu and David Sanan --</subfield><subfield code="t">Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach /</subfield><subfield code="r">Matthew Smith and Elisabeth Pate-Cornell --</subfield><subfield code="t">A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification /</subfield><subfield code="r">Victor Pomponiu and Vrizlynn L.L. Thing --</subfield><subfield code="t">Mind the Gap: Security Analysis of Metro Platform Screen Door System /</subfield><subfield code="r">Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong and Jianying Zhou --</subfield><subfield code="t">Attribute-Based Secure Messaging in the Public Cloud /</subfield><subfield code="r">Zhi Yuan Poh, Hui Cui, Robert H Deng and Yingjiu Li --</subfield><subfield code="t">Faster ECC over F /</subfield><subfield code="r">(feat. PMULL) /</subfield><subfield code="r">Hwajung Seo --</subfield><subfield code="t">Scholarly Digital Libraries as a Platform for Mal ware Distribution /</subfield><subfield code="r">Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Liar Rokach, Yuval Elovici and Lee Giles --</subfield><subfield code="t">Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification /</subfield><subfield code="r">Chien Eao Lee, Lilei Zheng, Ying Zhang and Vrizlynn L.L. Thing --</subfield><subfield code="t">Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs /</subfield><subfield code="r">G. Sumathi, L Srivani, D. Thirugnana Murthy, Anish Kumar and K Madhusoodanan.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Roychoudhury, Abhik,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009016159</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Yang,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">A systems approach to cyber security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGpbVW43PmPffHPvJbQM8y</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Singapore Cyber-Security R & D Conference (2nd : 2017 : Singapore).</subfield><subfield code="t">Systems approach to cyber security</subfield><subfield code="z">9781614997436</subfield><subfield code="w">(OCoLC)973917842</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 15.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008086431</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640393</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1640393</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis39532436</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15009580</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn993700410 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:55Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781614997443 1614997446 |
language | English |
oclc_num | 993700410 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (x, 161 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IOS Press B.V., |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and information security series ; |
spelling | Singapore Cyber-Security R & D Conference (2nd : 2017 : Singapore) A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / edited by Abhik Roychoudhury and Yang Liu. Amsterdam : IOS Press B.V., [2017] ©2017 1 online resource (x, 161 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptology and information security series ; volume 15 Includes bibliographical references and indexes. Print version record. Designing Security-Aware Architectures and Systems / RubyB. Lee -- Verification of Security Protocols and the Secrecy Problem / Luke Ong -- Let's Stick Together: Digitally Ensuring Physical Proximity / Sjouke Mauw -- Chat-App Decryption Key Extraction Through Information Flow Analysis / Zhongmin Dai, Sufatrio, Tong-Wei Chua, Dinesh Kumar Balakrishnan and Vrizlynn L.L. Thing -- VeriFormal: An Executable Formal Model of a Hardware Description Language / Wilayat Khan, A/wen Tiu and David Sanan -- Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach / Matthew Smith and Elisabeth Pate-Cornell -- A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification / Victor Pomponiu and Vrizlynn L.L. Thing -- Mind the Gap: Security Analysis of Metro Platform Screen Door System / Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong and Jianying Zhou -- Attribute-Based Secure Messaging in the Public Cloud / Zhi Yuan Poh, Hui Cui, Robert H Deng and Yingjiu Li -- Faster ECC over F / (feat. PMULL) / Hwajung Seo -- Scholarly Digital Libraries as a Platform for Mal ware Distribution / Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Liar Rokach, Yuval Elovici and Lee Giles -- Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification / Chien Eao Lee, Lilei Zheng, Ying Zhang and Vrizlynn L.L. Thing -- Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs / G. Sumathi, L Srivani, D. Thirugnana Murthy, Anish Kumar and K Madhusoodanan. Computer security Congresses. Internet Security measures Congresses. Sécurité informatique Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. bisacsh Computer security fast Internet Security measures fast Conference papers and proceedings fast Roychoudhury, Abhik, editor. http://id.loc.gov/authorities/names/n2009016159 Liu, Yang, editor. IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: A systems approach to cyber security (Text) https://id.oclc.org/worldcat/entity/E39PCGpbVW43PmPffHPvJbQM8y https://id.oclc.org/worldcat/ontology/hasWork Print version: Singapore Cyber-Security R & D Conference (2nd : 2017 : Singapore). Systems approach to cyber security 9781614997436 (OCoLC)973917842 Cryptology and information security series ; v. 15. http://id.loc.gov/authorities/names/no2008086431 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640393 Volltext |
spellingShingle | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / Cryptology and information security series ; Designing Security-Aware Architectures and Systems / Verification of Security Protocols and the Secrecy Problem / Let's Stick Together: Digitally Ensuring Physical Proximity / Chat-App Decryption Key Extraction Through Information Flow Analysis / VeriFormal: An Executable Formal Model of a Hardware Description Language / Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach / A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification / Mind the Gap: Security Analysis of Metro Platform Screen Door System / Attribute-Based Secure Messaging in the Public Cloud / Faster ECC over F / Scholarly Digital Libraries as a Platform for Mal ware Distribution / Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification / Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs / Computer security Congresses. Internet Security measures Congresses. Sécurité informatique Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. bisacsh Computer security fast Internet Security measures fast |
title | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / |
title_alt | Designing Security-Aware Architectures and Systems / Verification of Security Protocols and the Secrecy Problem / Let's Stick Together: Digitally Ensuring Physical Proximity / Chat-App Decryption Key Extraction Through Information Flow Analysis / VeriFormal: An Executable Formal Model of a Hardware Description Language / Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach / A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification / Mind the Gap: Security Analysis of Metro Platform Screen Door System / Attribute-Based Secure Messaging in the Public Cloud / Faster ECC over F / Scholarly Digital Libraries as a Platform for Mal ware Distribution / Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification / Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs / |
title_auth | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / |
title_exact_search | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / |
title_full | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / edited by Abhik Roychoudhury and Yang Liu. |
title_fullStr | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / edited by Abhik Roychoudhury and Yang Liu. |
title_full_unstemmed | A systems approach to cyber security : proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / edited by Abhik Roychoudhury and Yang Liu. |
title_short | A systems approach to cyber security : |
title_sort | systems approach to cyber security proceedings of the 2nd singapore cyber security r d conference sg crc 2017 |
title_sub | proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) / |
topic | Computer security Congresses. Internet Security measures Congresses. Sécurité informatique Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. bisacsh Computer security fast Internet Security measures fast |
topic_facet | Computer security Congresses. Internet Security measures Congresses. Sécurité informatique Congrès. Internet Sécurité Mesures Congrès. COMPUTERS Security General. Computer security Internet Security measures Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640393 |
work_keys_str_mv | AT singaporecybersecurityrdconferencesingapore asystemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT roychoudhuryabhik asystemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT liuyang asystemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT iospress asystemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT singaporecybersecurityrdconferencesingapore systemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT roychoudhuryabhik systemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT liuyang systemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 AT iospress systemsapproachtocybersecurityproceedingsofthe2ndsingaporecybersecurityrdconferencesgcrc2017 |