Narrow your search
Listing 11 - 20 of 65 << page
of 7
>>
Sort by

Book
Software Similarity and Classification
Authors: --- ---
ISBN: 9781447129097 Year: 2012 Publisher: London Springer London

Loading...
Export citation

Choose an application

Bookmark

Abstract

Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.


Book
Security and Privacy in Social Networks and Big Data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings
Authors: --- ---
ISBN: 9811590311 9811590303 Year: 2020 Publisher: Singapore : Springer Nature Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.

Keywords

Computer networks --- Application software. --- Computer communication systems. --- Computers. --- Data encryption (Computer science). --- Computer security. --- Mobile and Network Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Computing Milieux. --- Cryptology. --- Systems and Data Security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Security measures --- Distributed processing --- Data encryption (Computer science) --- Computer networks. --- Cryptography. --- Data protection. --- Computer and Information Systems Applications. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers


Book
Bioinspiration : From Nano to Micro Scales
Authors: ---
ISBN: 9781461453727 Year: 2012 Publisher: New York NY Springer New York Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Methods in bioinspiration and biomimicking have been around for a long time. However, due to current advances in modern physical, biological sciences, and technologies, our understanding of the methods have evolved to a new level. This is due not only to the identification of mysterious and fascinating phenomena but also to the understandings of the correlation between the structural factors and the performance based on the latest theoretical, modeling, and experimental technologies. Bioinspiration: From Nano to Micro Scale provides readers with a broad view of the frontiers of research in the area of bioinspiration from the nano to macroscopic scales, particularly in the areas of biomineralization, antifreeze protein, and antifreeze effect. It also covers such methods as the lotus effect and superhydrophobicity, structural colors in animal kingdom and beyond, as well as behavior in ion channels. A number of international experts in related fields have contributed to this book, which offers a comprehensive and synergistic look into challenging issues such as theoretical modeling, advanced surface probing, and fabrication. The book also provides a link to the engineering of novel advanced materials playing an important role in advancing technologies in various fields.

Keywords


Book
Frontiers and Progress of Current Soft Matter Research
Authors: ---
ISBN: 9789811592973 9789811592980 9789811592997 9789811592966 Year: 2021 Publisher: Singapore Springer Singapore :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Algorithmic Aspects in Information and Management : Third International Conference, AAIM 2007, Portland, OR, USA, June 6-8, 2007, Proceedings
Authors: ---
ISBN: 9783540728702 Year: 2007 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management : Joint International Conference, FAW-AAIM 2011, Jinhua, China, May 28-31, 2011. Proceedings
Authors: --- ---
ISBN: 9783642212048 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Ad-hoc, Mobile, and Wireless Networks : 11th International Conference, ADHOC-NOW 2012, Belgrade, Serbia, July 9-11, 2012. Proceedings
Authors: --- ---
ISBN: 9783642316388 Year: 2012 Publisher: Berlin, Heidelberg Imprint: Springer


Digital
Honeypot Frameworks and Their Applications: A New Framework
Authors: --- ---
ISBN: 9789811077395 Year: 2018 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.


Digital
Security and Privacy in Social Networks and Big Data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings
Authors: --- ---
ISBN: 9789811590313 Year: 2020 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.


Book
Proceedings of the 1st ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing
Authors: --- ---
Year: 2008 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 11 - 20 of 65 << page
of 7
>>
Sort by