Choose an application
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.
Choose an application
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
Computer networks --- Application software. --- Computer communication systems. --- Computers. --- Data encryption (Computer science). --- Computer security. --- Mobile and Network Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Computing Milieux. --- Cryptology. --- Systems and Data Security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Security measures --- Distributed processing --- Data encryption (Computer science) --- Computer networks. --- Cryptography. --- Data protection. --- Computer and Information Systems Applications. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
Methods in bioinspiration and biomimicking have been around for a long time. However, due to current advances in modern physical, biological sciences, and technologies, our understanding of the methods have evolved to a new level. This is due not only to the identification of mysterious and fascinating phenomena but also to the understandings of the correlation between the structural factors and the performance based on the latest theoretical, modeling, and experimental technologies. Bioinspiration: From Nano to Micro Scale provides readers with a broad view of the frontiers of research in the area of bioinspiration from the nano to macroscopic scales, particularly in the areas of biomineralization, antifreeze protein, and antifreeze effect. It also covers such methods as the lotus effect and superhydrophobicity, structural colors in animal kingdom and beyond, as well as behavior in ion channels. A number of international experts in related fields have contributed to this book, which offers a comprehensive and synergistic look into challenging issues such as theoretical modeling, advanced surface probing, and fabrication. The book also provides a link to the engineering of novel advanced materials playing an important role in advancing technologies in various fields.
Choose an application
Thermodynamics --- General biophysics --- Human biochemistry --- Materials sciences --- Biotechnology --- thermodynamica --- biologische materialen --- materiaalkennis --- medische biochemie --- biofysica --- bio-engineering --- biotechnologie
Choose an application
Complex analysis --- Operational research. Game theory --- Discrete mathematics --- Business management --- Computer science --- Computer. Automation --- discrete wiskunde --- stochastische analyse --- complexe analyse (wiskunde) --- informatica --- management --- database management --- informatietechnologie --- programmatielogica --- numerieke analyse
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer. Automation --- toegepaste informatica --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- database management --- wiskunde --- programmatielogica --- informatica management
Choose an application
Mass communications --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- draadloze computernetwerken --- mobiele netwerken --- ad-hocnetwerken --- software engineering --- informatica management --- computernetwerken --- communicatietechnologie
Choose an application
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.
Complex analysis --- Mathematics --- Applied physical engineering --- Production management --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- toegepaste wiskunde --- complexe analyse (wiskunde) --- veiligheid (mensen) --- bitcoin --- vormgeving --- computers --- informatica --- computerbesturingssystemen --- mineralen (chemie) --- simulaties --- mijnbouw --- wiskunde --- computerbeveiliging --- KI (kunstmatige intelligentie) --- OS (operating system) --- computernetwerken --- computerkunde
Choose an application
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- computers --- informatica --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Choose an application