Get Free Shipping on orders over $0
Information Security Applications : 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers - Hyoungshick Kim

Information Security Applications

22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers

By: Hyoungshick Kim (Editor)

Paperback | 27 October 2021

At a Glance

Paperback


$109.00

or 4 interest-free payments of $27.25 with

 or 

Ships in 5 to 7 business days

Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.

More in Algorithms & Data Structures

Addiction by Design : Machine Gambling in Las Vegas - Natasha Dow Schll
Python for Algorithmic Trading : From Idea to Cloud Deployment - Yves Hilpisch
Learning Spark : Lightning-Fast Data Analytics - Brooke Wenig

RRP $152.00

$73.75

51%
OFF
New Storytelling : Learning through Metaphors - Anna Ursyn

RRP $110.00

$96.75

12%
OFF
Digital Minds 1.0 : AI Welfare, Ethics, and Beyond - Soenke Ziesche

RRP $252.00

$219.75

13%
OFF
Mathematical Foundations of Deep Learning : Theory and Algorithms - Xiaojing Ye
Inclusive Education : STEM in the Age of Modern AI - H.M.K.K.M.B. Herath

RRP $112.00

$97.75

13%
OFF
Inclusive Education : STEM in the Age of Modern AI - H.M.K.K.M.B. Herath

RRP $294.00

$254.75

13%
OFF
Fundamentals of Data Structures and Algorithms - Elvis C. Foster

RRP $380.00

$325.99

14%
OFF
Theory of Computation for Software Developers - Maxim Mozgovoy

RRP $189.00

$167.75

11%
OFF