|
|
|
|
LEADER |
03044nam a22006015i 4500 |
001 |
978-3-319-51966-1 |
003 |
DE-He213 |
005 |
20161228130753.0 |
007 |
cr nn 008mamaa |
008 |
161228s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319519661
|9 978-3-319-51966-1
|
024 |
7 |
|
|a 10.1007/978-3-319-51966-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Foundations and Practice of Security
|h [electronic resource] :
|b 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers /
|c edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIII, 361 p. 83 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10128
|
505 |
0 |
|
|a Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Cuppens, Frédéric.
|e editor.
|
700 |
1 |
|
|a Wang, Lingyu.
|e editor.
|
700 |
1 |
|
|a Cuppens-Boulahia, Nora.
|e editor.
|
700 |
1 |
|
|a Tawbi, Nadia.
|e editor.
|
700 |
1 |
|
|a Garcia-Alfaro, Joaquin.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319519654
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10128
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-51966-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|