Get Free Shipping on orders over $79
Information Security Applications : 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers - Hyoungshick Kim

Information Security Applications

22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers

By: Hyoungshick Kim (Editor)

Paperback | 27 October 2021

At a Glance

Paperback


$109.75

or 4 interest-free payments of $27.44 with

 or 

Ships in 5 to 7 business days

Machine Learning Security.- LOM: Lightweight classifier for obfuscation methods.- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection.- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks.- On the robustness of intrusion detection systems for vehicles against adversarial attacks.- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems.- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments.- Research on improvement of anomaly detection performance in industrial control systems.- Cryptography.- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.- Anonymous IBE from PEKS : A Generic Construction.- Secure Computation of Shared Secrets and Its Applications.- Pattern Matching over Encrypted Data with a Short Ciphertext.- Efficient adaptation of TFHE for high end-to-end throughput.- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling.- Hardware Security.- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor.- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors.- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks.- Application Security.- Adaptive Network Security Service Orchestraction based on SDN/NFV.- A General Framework for Matching Pattern Hiding in Deep Packet Inspection.- A Privacy-Preserving Payment Model for EV Charging.- Measuring Healthcare Data Breaches.- BadASLR: Exceptional cases of ASLR aiding Exploitation.

More in Algorithms & Data Structures

Advanced Computational Intelligence Techniques for Engineers - N. Narayanan Prasanth
Addiction by Design : Machine Gambling in Las Vegas - Natasha Dow Schll
Python for Algorithmic Trading : From Idea to Cloud Deployment - Yves Hilpisch
Learning Spark : Lightning-Fast Data Analytics - Brooke Wenig

RRP $152.00

$73.75

51%
OFF
New Storytelling : Learning through Metaphors - Anna Ursyn

RRP $103.00

$91.75

11%
OFF
Uncertain Data Analysis : Fuzzy Vector Algorithms - Sansanee Auephanwiriyakul
Uncertain Data Analysis : Fuzzy Vector Algorithms - Sansanee Auephanwiriyakul

RRP $94.99

$85.75

10%
OFF
Applied Data Science in FinTech : Models, Tools, and Case Studies - Juraj Hric
Python 3 Using DeepSeek - Oswald Campesato

$348.75