首页 > 最新文献

Information Security Practice and Experience最新文献

英文 中文
CATCHA: When Cats Track Your Movements Online CATCHA:当猫在网上跟踪你的一举一动
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_10
Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat
{"title":"CATCHA: When Cats Track Your Movements Online","authors":"Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat","doi":"10.1007/978-3-030-34339-2_10","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_10","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Preserving Approach in Dynamic Social Network Data Publishing 动态社交网络数据发布中的隐私保护方法
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_21
Kamalkumar R. Macwan, Sankita J. Patel
{"title":"Privacy Preserving Approach in Dynamic Social Network Data Publishing","authors":"Kamalkumar R. Macwan, Sankita J. Patel","doi":"10.1007/978-3-030-34339-2_21","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_21","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Generating Phishing Emails Using Graph Database 利用图形数据库生成网络钓鱼邮件
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_25
Nasim Maleki, A. Ghorbani
{"title":"Generating Phishing Emails Using Graph Database","authors":"Nasim Maleki, A. Ghorbani","doi":"10.1007/978-3-030-34339-2_25","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_25","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using IFTTT to Express and Enforce UCON Obligations 使用IFTTT来表达和执行UCON义务
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_12
Antonio La Marra, F. Martinelli, P. Mori, Athanasios Rizos, A. Saracino
{"title":"Using IFTTT to Express and Enforce UCON Obligations","authors":"Antonio La Marra, F. Martinelli, P. Mori, Athanasios Rizos, A. Saracino","doi":"10.1007/978-3-030-34339-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_12","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection 协同入侵检测中基于支持向量机的入侵灵敏度分配评估
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_26
Wenjuan Li, W. Meng, Lam-for Kwok
{"title":"Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection","authors":"Wenjuan Li, W. Meng, Lam-for Kwok","doi":"10.1007/978-3-030-34339-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_26","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Recovering Internal States of Grain-v1 恢复Grain-v1的内部状态
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_18
Deepak Kumar Dalai, Santu Pal
{"title":"Recovering Internal States of Grain-v1","authors":"Deepak Kumar Dalai, Santu Pal","doi":"10.1007/978-3-030-34339-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_18","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings 基于椭圆曲线自同态环的改进数字签名
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_16
Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, R. Azarderakhsh
{"title":"Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings","authors":"Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, R. Azarderakhsh","doi":"10.1007/978-3-030-34339-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_16","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm 弱密码的(持续)威胁:一种半自动密码破解算法的实现
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_27
C. Pelchen, David Jaeger, Feng Cheng, C. Meinel
{"title":"The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm","authors":"C. Pelchen, David Jaeger, Feng Cheng, C. Meinel","doi":"10.1007/978-3-030-34339-2_27","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_27","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132986245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel and Comprehensive Evaluation Methodology for SIEM 一种新的SIEM综合评价方法
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_28
M. Safarzadeh, Hossein Gharaee, A. Panahi
{"title":"A Novel and Comprehensive Evaluation Methodology for SIEM","authors":"M. Safarzadeh, Hossein Gharaee, A. Panahi","doi":"10.1007/978-3-030-34339-2_28","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_28","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Software PUF Based on Gyroscope 基于陀螺仪的PUF软件评价
Pub Date : 2019-11-26 DOI: 10.1007/978-3-030-34339-2_13
Kazuhide Fukushima, Ayumu Yoshimura, S. Kiyomoto, Norikazu Yamasaki
{"title":"Evaluation of Software PUF Based on Gyroscope","authors":"Kazuhide Fukushima, Ayumu Yoshimura, S. Kiyomoto, Norikazu Yamasaki","doi":"10.1007/978-3-030-34339-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-34339-2_13","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133914839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Information Security Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1