Get Free Shipping on orders over $89
Lecture Notes in Computer Science : 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30â"December 2, 2022, Proceedings - Hans P. Reiser
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Lecture Notes in Computer Science

27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30â"December 2, 2022, Proceedings

By: Hans P. Reiser (Editor), Marcel Kyas (Editor)

Paperback | 2 January 2023

At a Glance

Paperback


$109.00

or 4 interest-free payments of $27.25 with

 or 

Ships in 5 to 7 business days

On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.

More in Network Hardware

Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
Wireless Networks : Wireless Networks - Dusit Niyato