Computer Network Security [electronic resource] : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / edited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski.
Material type: TextSeries: Computer Communication Networks and Telecommunications ; 10446 | Lecture Notes in Computer Science ; 10446Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XIII, 362 p. 141 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319651279Subject(s): Computer security | Computer communication systems | Computers and civilization | Computers | Law and legislation | Data encryption (Computer science) | Computer system failures | Systems and Data Security | Computer Communication Networks | Computers and Society | Legal Aspects of Computing | Cryptology | System Performance and EvaluationAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK15658 |
Critical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security.
This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.
There are no comments on this title.