PORTO-
FREI

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings

Holistic model for HTTP botnet detection based on DNS traffic analysis.- Detecting broad length algorithmically generated domains.- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology.- Detecting command and control channel of botnets in clouds.- An experimental framework for investigating security and privacy of IoT devices.- Dynamic cypher for enhanced cryptography and communication for Internet of Things.- An inter-device authentication scheme for smart homes using one-time-password over infrared channel.- Detection and prevention of blackhole attacks in wireless sensor networks.- Detection of online fake news using N-gram analysis and machine learning techniques.- Security protocol of social payment apps.- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF.- Infant monitoring system using wearable sensors based on blood oxygen saturation.- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection.

Buch (Kartoniert)

EUR 53,49

Alle Preisangaben inkl. MwSt.

Auch verfügbar als:

  Verlagsbedingte Lieferzeit ca. 3 - 6 Werktage.
(Print on Demand. Lieferbar innerhalb von 7 bis 10 Tagen)

Versandkostenfrei*

 
 

Produktbeschreibung

Holistic model for HTTP botnet detection based on DNS traffic analysis.- Detecting broad length algorithmically generated domains.- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology.- Detecting command and control channel of botnets in clouds.- An experimental framework for investigating security and privacy of IoT devices.- Dynamic cypher for enhanced cryptography and communication for Internet of Things.- An inter-device authentication scheme for smart homes using one-time-password over infrared channel.- Detection and prevention of blackhole attacks in wireless sensor networks.- Detection of online fake news using N-gram analysis and machine learning techniques.- Security protocol of social payment apps.- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF.- Infant monitoring system using wearable sensors based on blood oxygen saturation.- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection. 

Inhaltsverzeichnis

Holistic model for HTTP botnet detection based on DNS traffic analysis.- Detecting broad length algorithmically generated domains.- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology.- Detecting command and control channel of botnets in clouds.- An experimental framework for investigating security and privacy of IoT devices.- Dynamic cypher for enhanced cryptography and communication for Internet of Things.- An inter-device authentication scheme for smart homes using one-time-password over infrared channel.- Detection and prevention of blackhole attacks in wireless sensor networks.- Detection of online fake news using N-gram analysis and machine learning techniques.- Security protocol of social payment apps.- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF.- Infant monitoring system using wearable sensors based on blood oxygen saturation.- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection. 

Mehr vom Verlag:

k.A.

Mehr aus der Reihe:

Produktdetails

Medium: Buch
Format: Kartoniert
Seiten: 208
Sprache: Englisch
Erschienen: Oktober 2017
Auflage: 1st edition 2017
Sonstiges: .978-3-319-69154-1
Maße: 235 x 155 mm
Gewicht: 324 g
ISBN-10: 3319691546
ISBN-13: 9783319691541

Bestell-Nr.: 20607779 
Libri-Verkaufsrang (LVR):
Libri-Relevanz: 0 (max 9.999)
 

Ist ein Paket? 0
Rohertrag: 11,50 €
Porto: 1,84 €
Deckungsbeitrag: 9,66 €

LIBRI: 1891014
LIBRI-EK*: 38.49 € (23%)
LIBRI-VK: 53,49 €
Libri-STOCK: 0
LIBRI: 097 Print on Demand. Lieferbar innerhalb von 7 bis 10 Tagen * EK = ohne MwSt.
P_SALEALLOWED: WORLD
DRM: 0
0 = Kein Kopierschutz
1 = PDF Wasserzeichen
2 = DRM Adobe
3 = DRM WMA (Windows Media Audio)
4 = MP3 Wasserzeichen
6 = EPUB Wasserzeichen

UVP: 2 
Warengruppe: 16360 

KNO: 65919233
KNO-EK*: 33.72 € (23%)
KNO-VK: 53,49 €
KNO-STOCK: 0
KNO-MS: 97

KNO-SAMMLUNG: Lecture Notes in Computer Science .10618
P_ABB: Bibliographie
KNOABBVERMERK: 1st ed. 2017. 2017. xxii, 183 S. XXII, 183 p. 68 illus. 235 mm
KNOSONSTTEXT: .978-3-319-69154-1
KNOMITARBEITER: Herausgegeben von Traore, Issa; Woungang, Isaac; Awad, Ahmed
Einband: Kartoniert
Auflage: 1st edition 2017
Sprache: Englisch
Beilage(n): Paperback

Alle Preise inkl. MwSt. , innerhalb Deutschlands liefern wir immer versandkostenfrei . Informationen zum Versand ins Ausland .

Kostenloser Versand *

innerhalb eines Werktages

OHNE RISIKO

30 Tage Rückgaberecht

Käuferschutz

mit Geld-Zurück-Garantie