Park / Austin / Jadav | Silicon Valley Cybersecurity Conference | Buch | 978-3-030-72724-6 | sack.de

Buch, Englisch, Band 1383, 227 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 371 g

Reihe: Communications in Computer and Information Science

Park / Austin / Jadav

Silicon Valley Cybersecurity Conference

First Conference, SVCC 2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers
1. Auflage 2021
ISBN: 978-3-030-72724-6
Verlag: Springer International Publishing

First Conference, SVCC 2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers

Buch, Englisch, Band 1383, 227 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 371 g

Reihe: Communications in Computer and Information Science

ISBN: 978-3-030-72724-6
Verlag: Springer International Publishing


This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. 
The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems.
Park / Austin / Jadav Silicon Valley Cybersecurity Conference jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.- A Secure Encapsulation Schemes based on Key Recovery System.- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.- STRISA: A New Regulation Architecture to Enforce Travel Rule.- Post-Quantum Hash-Based Signatures for Secure Boot.- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards.- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management.- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping.- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management.- A Privacy Preserving E-voting System based on Blockchain.- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.- ConTheModel: Can we modify tweets to confuse classifier models?.-  A Systematic Approach to Building Autoencoders for Intrusion Detection.- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure.- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work.- IoT Checker Using Timing Side-channel and Machine Learning.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.