Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings

Author:   Igor Kotenko ,  Victor Skormin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2012 ed.
Volume:   7531
ISBN:  

9783642337031


Pages:   319
Publication Date:   04 September 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Igor Kotenko ,  Victor Skormin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2012 ed.
Volume:   7531
Dimensions:   Width: 15.50cm , Height: 1.70cm , Length: 23.50cm
Weight:   0.516kg
ISBN:  

9783642337031


ISBN 10:   3642337031
Pages:   319
Publication Date:   04 September 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Finding Malware on a Web Scale..- Exposing Security Risks for Commercial Mobile Devices.- From Qualitative to Quantitative Enforcement of Security Policy.- Design and Implementation of a Cloud-Based Assured Information Sharing System.- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols.- Blind 384-bit Digital Signature Scheme.- RABAC: Role-Centric Attribute-Based Access Control.- Trust-Aware RBAC.- Alternative Mechanisms for Information Security.- Flow Policies by a Three-Valued Analysis.- Towards the Orchestration of Secured Services under Non-disclosure Policies.- An Approach for Network Information Flow Analysis for Systems of Embedded Components.- Individual Countermeasure Selection Based on the Return On Response Investment Index.- Security and Reliability Requirements for Advanced Security Event Management.- Model-Based Security Event Management.- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks.- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation.- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems.- Malware Characterization Using Behavioral Components.- MADAM: A Multi-level Anomaly Detector for Android Malware.- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods.- Configuration-Based Approach to Embedded Device Security.- A Study of Entropy Sources in Cloud Computers: Random Number.- Generation on Cloud Hosts.- Security Modeling of Grid Systems Using Petri Nets.- Using Graph Theory for Cloud System Security Modeling.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List