My Account Log in

1 option

Secure IT Systems : 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings / edited by Hans P. Reiser, Marcel Kyas.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Reiser, Hans P., editor.
Kyas, Marcel, editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13700
Language:
English
Subjects (All):
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Computer networks.
Database management.
Application software.
Data and Information Security.
Cryptology.
Mobile and Network Security.
Database Management System.
Computer and Information Systems Applications.
Computer Communication Networks.
Local Subjects:
Data and Information Security.
Cryptology.
Mobile and Network Security.
Database Management System.
Computer and Information Systems Applications.
Computer Communication Networks.
Physical Description:
1 online resource (390 pages)
Edition:
1st ed. 2022.
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
Summary:
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 – December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
Contents:
On the Effectiveness of Intersection Attacks in Anonymous Microblogging
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement
Location Privacy, 5G AKA, and Enhancements
Local Differential Privacy for Private Construction of Classification Algorithms
IMSI Probing: Possibilities and Limitations
Honeysweeper: Towards stealthy honeytoken fingerprinting techniques
Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters
DeCrypto: Finding Cryptocurrency Miners on ISP networks
Detection of Voice Conversion Spoofing Attacks using Voiced Speech
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs
Obfuscation-resilient Semantic Functionality Identification Through Program Simulation
Malware Analysis with Symbolic Execution and Graph Kernel
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
Maraudrone’s Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.
Notes:
Includes bibliographical references and index.
Other Format:
Print version: Reiser, Hans P. Secure IT Systems
ISBN:
3-031-22295-4

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account