Unlimited Access
For Registered Users
To contact us, you can contact us via the following mobile numbers by calling and WhatsApp
For Registered Users
100% Secure Payment
10 Days Returns
Call Us Anytime
edition: 1st ed. Authors: Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro serie: Lecture Notes in Computer Science 10694 ISBN : 9783319766867, 9783319766874 publisher: Springer International Publishing publish year: 2018 pages: 267 language: English ebook format : PDF (It will be converted to PDF, EPUB OR AZW3 if requested by the user) file size: 15 MB
Front Matter ....Pages I-X
Front Matter ....Pages 1-1
Automatic Vulnerability Classification Using Machine Learning (Marian Gawron, Feng Cheng, Christoph Meinel)....Pages 3-17
A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems (Muhammad Imran Khan, Barry O’Sullivan, Simon N. Foley)....Pages 18-28
Towards a Security Event Data Taxonomy (Gustavo Gonzalez-Granadillo, José Rubio-Hernán, Joaquin Garcia-Alfaro)....Pages 29-45
Front Matter ....Pages 47-47
Unraveling Reflection Induced Sensitive Leaks in Android Apps (Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj S. Gaur, Daya Ram Sharma, Akka Zemmari et al.)....Pages 49-65
Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions (Alessio Viticchié, Cataldo Basile, Antonio Lioy)....Pages 66-82
Using Data Integration to Help Design More Secure Applications (Sébastien Salva, Loukmen Regainia)....Pages 83-98
Front Matter ....Pages 99-99
MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems (Zeineb Ben Yahya, Farah Barika Ktata, Khaled Ghedira)....Pages 101-114
A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices (Bogdan Groza, Cosmin Briceag)....Pages 115-123
Front Matter ....Pages 125-125
Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications (Khalil Hariss, Hassan Noura, Abed Ellatif Samhat, Maroun Chamoun)....Pages 127-139
A Study of Threat Detection Systems and Techniques in the Cloud (Pamela Carvallo, Ana R. Cavalli, Natalia Kushik)....Pages 140-155
Front Matter ....Pages 157-157
Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market (Fabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin)....Pages 159-174
Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence (Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah)....Pages 175-183
Front Matter ....Pages 185-185
Phishing Attacks Root Causes (Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans)....Pages 187-202
Domain Name System Without Root Servers (Matthäus Wander, Christopher Boelmann, Torben Weis)....Pages 203-216
Data Hiding on Social Media Communications Using Text Steganography (Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang, Chin-Laung Lei)....Pages 217-224
Front Matter ....Pages 225-225
Privacy Scoring of Social Network User Profiles Through Risk Analysis (Sourya Joyee De, Abdessamad Imine)....Pages 227-243
A Method for Developing Qualitative Security Risk Assessment Algorithms (Gencer Erdogan, Atle Refsdal)....Pages 244-259
An Empirical Analysis of Risk Aversion in Malware Infections (Jude Jacob Nsiempba, Fanny Lalonde Lévesque, Nathalie de Marcellis-Warin, José M. Fernandez)....Pages 260-267
Back Matter ....Pages 269-269