Amazon cover image
Image from Amazon.com

Computer network security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski (eds.).

By: (7th : International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (7th : 2017 : Warsaw, Poland)Contributor(s): Rak, Jacek [editor.] | Bay, John [editor.] | Kotenko, Igor [editor.] | Popyack, Leonard J, 1963- [editor.] | Skormin, Victor A, 1946- [editor.] | Szczypiorski, Krzysztof, 1949- [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 10446. | LNCS sublibrary. SL 5, Computer communication networks and telecommunications.Publisher: Cham, Switzerland : Springer, 2017Description: 1 online resource (xiii, 362 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319651279; 3319651277; 3319651269; 9783319651262Other title: MMM-ACNS 2017Subject(s): Computer security -- Mathematics -- Congresses | Computer networks -- Security measures -- Mathematics -- Congresses | Network hardware | Ethical & social aspects of IT | Legal aspects of IT | Coding theory & cryptology | Systems analysis & design | Computer security | Computers -- Hardware -- Network Hardware | Computers -- Social Aspects -- General | Law -- Science & Technology | Computers -- Security -- General | Computers -- Hardware -- Handheld Devices | Computer networks | Computer science | Computer security | Computer system failures | Computers | Computers and civilization | Data encryption (Computer science)Genre/Form: Electronic books. | Electronic books. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security.
Summary: This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed August 17, 2017).

Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security.

This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.

Powered by Koha