|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn993700410 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
170714t20172017ne a ob 101 0 eng d |
040 |
|
|
|a IOSPR
|b eng
|e rda
|e pn
|c IOSPR
|d OCLCA
|d NAM
|d YDX
|d N$T
|d IDEBK
|d VT2
|d AU@
|d CUS
|d G3B
|d IGB
|d STF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1013503670
|a 1048103553
|
020 |
|
|
|a 9781614997443
|q (electronic bk.)
|
020 |
|
|
|a 1614997446
|q (electronic bk.)
|
020 |
|
|
|z 9781614997436
|q (print)
|
020 |
|
|
|z 1614997438
|
029 |
1 |
|
|a AU@
|b 000062553453
|
035 |
|
|
|a (OCoLC)993700410
|z (OCoLC)1013503670
|z (OCoLC)1048103553
|
037 |
|
|
|a 9781614997443
|b IOS Press
|n http://www.iospress.nl
|
050 |
|
4 |
|a QA76.9.A25
|b C9186 2017eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
111 |
2 |
|
|a Singapore Cyber-Security R & D Conference
|n (2nd :
|d 2017 :
|c Singapore)
|
245 |
1 |
2 |
|a A systems approach to cyber security :
|b proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) /
|c edited by Abhik Roychoudhury and Yang Liu.
|
264 |
|
1 |
|a Amsterdam :
|b IOS Press B.V.,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (x, 161 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cryptology and information security series ;
|v volume 15
|
504 |
|
|
|a Includes bibliographical references and indexes.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|t Designing Security-Aware Architectures and Systems /
|r RubyB. Lee --
|t Verification of Security Protocols and the Secrecy Problem /
|r Luke Ong --
|t Let's Stick Together: Digitally Ensuring Physical Proximity /
|r Sjouke Mauw --
|t Chat-App Decryption Key Extraction Through Information Flow Analysis /
|r Zhongmin Dai, Sufatrio, Tong-Wei Chua, Dinesh Kumar Balakrishnan and Vrizlynn L.L. Thing --
|t VeriFormal: An Executable Formal Model of a Hardware Description Language /
|r Wilayat Khan, A/wen Tiu and David Sanan --
|t Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach /
|r Matthew Smith and Elisabeth Pate-Cornell --
|t A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification /
|r Victor Pomponiu and Vrizlynn L.L. Thing --
|t Mind the Gap: Security Analysis of Metro Platform Screen Door System /
|r Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong and Jianying Zhou --
|t Attribute-Based Secure Messaging in the Public Cloud /
|r Zhi Yuan Poh, Hui Cui, Robert H Deng and Yingjiu Li --
|t Faster ECC over F /
|r (feat. PMULL) /
|r Hwajung Seo --
|t Scholarly Digital Libraries as a Platform for Mal ware Distribution /
|r Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Liar Rokach, Yuval Elovici and Lee Giles --
|t Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification /
|r Chien Eao Lee, Lilei Zheng, Ying Zhang and Vrizlynn L.L. Thing --
|t Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs /
|r G. Sumathi, L Srivani, D. Thirugnana Murthy, Anish Kumar and K Madhusoodanan.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
0 |
|a Internet
|x Security measures
|v Congresses.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures
|v Congrès.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Roychoudhury, Abhik,
|e editor.
|
700 |
1 |
|
|a Liu, Yang,
|e editor.
|
710 |
2 |
|
|a IOS Press.
|
776 |
0 |
8 |
|i Print version:
|a Singapore Cyber-Security R & D Conference (2nd : 2017 : Singapore).
|t Systems approach to cyber security
|z 9781614997436
|w (OCoLC)973917842
|
830 |
|
0 |
|a Cryptology and information security series ;
|v v. 15.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640393
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1640393
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis39532436
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15009580
|
994 |
|
|
|a 92
|b IZTAP
|