2010, ISBN: 9783642147067
This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Peter… Mehr…
ebooks.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
ISBN: 9783642147067
Computer Science; Computer Communication Networks Local Area Network, Protection, Quality of Service, Quality of Service (QoS), Virtual Local Area Network, access control, anomaly detecti… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
2010, ISBN: 9783642147067
5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings, e… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
Computer Network Security : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, - neues Buch
2010, ISBN: 9783642147067
; PDF; Computing > Computer hardware > Network hardware, Springer Berlin Heidelberg
hive.co.uk No. 9783642147067. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2010, ISBN: 9783642147067
Computer Network Security ab 60.99 EURO 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russ… Mehr…
eBook.de Nr. Versandkosten:, , zzgl. Versandkosten. Details... |
2010, ISBN: 9783642147067
This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Peter… Mehr…
ISBN: 9783642147067
Computer Science; Computer Communication Networks Local Area Network, Protection, Quality of Service, Quality of Service (QoS), Virtual Local Area Network, access control, anomaly detecti… Mehr…
2010
ISBN: 9783642147067
5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings, e… Mehr…
Computer Network Security : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, - neues Buch
2010, ISBN: 9783642147067
; PDF; Computing > Computer hardware > Network hardware, Springer Berlin Heidelberg
2010, ISBN: 9783642147067
Computer Network Security ab 60.99 EURO 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russ… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computer Network Security
EAN (ISBN-13): 9783642147067
Erscheinungsjahr: 2010
Herausgeber: Springer Berlin Heidelberg
Buch in der Datenbank seit 2017-03-27T14:18:24+02:00 (Vienna)
Detailseite zuletzt geändert am 2024-02-23T18:39:04+01:00 (Vienna)
ISBN/EAN: 9783642147067
ISBN - alternative Schreibweisen:
978-3-642-14706-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: dietrich, klaus bock
Titel des Buches: petersburg
Daten vom Verlag:
Autor/in: Igor Kotenko; Victor Skormin
Titel: Lecture Notes in Computer Science; Computer Communication Networks and Telecommunications; Computer Network Security - 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings
Verlag: Springer; Springer Berlin
345 Seiten
Erscheinungsjahr: 2010-08-12
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIII, 345 p. 92 illus.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Local Area Network; Protection; Quality of Service; Quality of Service (QoS); Virtual Local Area Network; access control; anomaly detection; application security; authentication; block ciphers; computer network; network security; security; C; Computer Communication Networks; Computer Science; BC
Invited Papers.- Service Dependencies in Information Systems Security.- Secure Applications without Secure Infrastructures.- Integrating Types and Specifications for Secure Software Development.- Cryptography for Network Security: Failures, Successes and Challenges.- Group-Centric Models for Secure and Agile Information Sharing.- Security Modeling and Covert Channels.- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors.- Attack and Defense Modeling with BDMP.- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems.- Problems of Modeling in the Analysis of Covert Channels.- Security Policies and Formal Analysis of Security Properties.- Policy-Based Design and Verification for Mission Assurance.- Using Equivalence Relations for Corrective Enforcement of Security Policies.- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus.- Authentication, Authorization, Access Control and Public Key Cryptography.- Credentials Management for High-Value Transactions.- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols.- Credential Chain Discovery in RTT Trust Management Language.- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks.- Intrusion and Malware Detection.- Intellectual Intrusion Detection with Sequences Alignment Methods.- Symptoms-Based Detection of Bot Processes.- A Comparison of Feature-Selection Methods for Intrusion Detection.- From NLP (Natural Language Processing) to MLP (Machine Language Processing).- Security of Multi-agent Systems and Software Protection.- Secure Multi-Agent System for Multi-Hop Environments.- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware.- Security and Scalability of Remote Entrusting Protection.- Adaptive Security, Security Analysis and Virtualization.- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks.- Predictive Security Analysis for Event-Driven Processes.- Virtual Environment Security Modeling.- Clarifying Integrity Control at the Trusted Information Environment.up-to-date results fast track conference proceedings state-of-the-art report
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319651262 Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 201 (Jacek Rak; John Bay; Igor Kotenko; Leonard Popyack; Victor Skormin; Krzysztof Szczypiorski)
- 9783319651262 Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 201 (Jacek Rak; John Bay; Igor Kotenko; Leonard Popyack; Victor Skormin; Krzysztof Szczypiorski)
- 9783642147050 Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 20 (Igor Kotenko; Victor Skormin)
< zum Archiv...