首页 > 最新文献

Mathematical Methods, Models, and Architectures for Network Security Systems最新文献

英文 中文
Toward Third-Party Immune Applications 面向第三方免疫应用
Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_28
O. Iraqi, H. Bakkali
{"title":"Toward Third-Party Immune Applications","authors":"O. Iraqi, H. Bakkali","doi":"10.1007/978-3-319-65127-9_28","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_28","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121997158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malware Analysis and Detection via Activity Trees in User-Dependent Environment 用户依赖环境下基于活动树的恶意软件分析与检测
Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_17
A. Tokhtabayev, A. Kopeikin, N. Tashatov, D. Satybaldina
{"title":"Malware Analysis and Detection via Activity Trees in User-Dependent Environment","authors":"A. Tokhtabayev, A. Kopeikin, N. Tashatov, D. Satybaldina","doi":"10.1007/978-3-319-65127-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_17","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems 扩展FAST-CPS用于信息物理系统数据流分析
Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_4
Laurens Lemaire, Jan Vossaert, B. Decker, Vincent Naessens
{"title":"Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems","authors":"Laurens Lemaire, Jan Vossaert, B. Decker, Vincent Naessens","doi":"10.1007/978-3-319-65127-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_4","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125109825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resident Security System for Government/Industry Owned Computers 政府/工业计算机驻地安全系统
Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_15
M. Davis, E. Korkmaz, A. Dolgikh, V. Skormin
{"title":"Resident Security System for Government/Industry Owned Computers","authors":"M. Davis, E. Korkmaz, A. Dolgikh, V. Skormin","doi":"10.1007/978-3-319-65127-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_15","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116452318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions 用于支付交易情境风险管理的持卡人信誉系统
Pub Date : 2017-08-28 DOI: 10.1007/978-3-319-65127-9_13
A. Sitek, Z. Kotulski
{"title":"Cardholder's Reputation System for Contextual Risk Management in Payment Transactions","authors":"A. Sitek, Z. Kotulski","doi":"10.1007/978-3-319-65127-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_13","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated Cryptographic Analysis of the Pedersen Commitment Scheme Pedersen承诺方案的自动密码分析
Pub Date : 2017-05-16 DOI: 10.1007/978-3-319-65127-9_22
Roberto Metere, Changyu Dong
{"title":"Automated Cryptographic Analysis of the Pedersen Commitment Scheme","authors":"Roberto Metere, Changyu Dong","doi":"10.1007/978-3-319-65127-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_22","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"481 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Trust-Aware RBAC Trust-Aware RBAC
Pub Date : 2012-10-17 DOI: 10.1007/978-3-642-33704-8_9
Vladimir A. Oleshchuk
{"title":"Trust-Aware RBAC","authors":"Vladimir A. Oleshchuk","doi":"10.1007/978-3-642-33704-8_9","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_9","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Model-Based Security Event Management 基于模型的安全事件管理
Pub Date : 2012-10-17 DOI: 10.1007/978-3-642-33704-8_16
J. Schütte, R. Rieke, Timo Winkelvos
{"title":"Model-Based Security Event Management","authors":"J. Schütte, R. Rieke, Timo Winkelvos","doi":"10.1007/978-3-642-33704-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_16","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122504399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Security Modeling of Grid Systems Using Petri Nets 基于Petri网的网格系统安全建模
Pub Date : 2012-10-17 DOI: 10.1007/978-3-642-33704-8_25
P. D. Zegzhda, D. Zegzhda, M. Kalinin, A. S. Konoplev
{"title":"Security Modeling of Grid Systems Using Petri Nets","authors":"P. D. Zegzhda, D. Zegzhda, M. Kalinin, A. S. Konoplev","doi":"10.1007/978-3-642-33704-8_25","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_25","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114359532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Using Graph Theory for Cloud System Security Modeling 基于图论的云系统安全建模
Pub Date : 2012-10-17 DOI: 10.1007/978-3-642-33704-8_26
P. D. Zegzhda, D. Zegzhda, A. Nikolskiy
{"title":"Using Graph Theory for Cloud System Security Modeling","authors":"P. D. Zegzhda, D. Zegzhda, A. Nikolskiy","doi":"10.1007/978-3-642-33704-8_26","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_26","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Mathematical Methods, Models, and Architectures for Network Security Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1