000 04847nam a22005775i 4500
001 978-3-319-97643-3
003 DE-He213
005 20210201191405.0
007 cr nn 008mamaa
008 181017s2018 gw | s |||| 0|eng d
020 _a9783319976433
_9978-3-319-97643-3
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
245 1 0 _aVersatile Cybersecurity
_h[electronic resource] /
_cedited by Mauro Conti, Gaurav Somani, Radha Poovendran.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXVI, 286 p. 70 illus., 51 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v72
500 _aAcceso multiusuario
505 0 _a1 An Android-based Covert Channel Framework on Wearables Using Status Bar Notifications -- 2 Insider Threat Detection: Machine Learning Way -- 3 Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions -- 4 Protection Against Semantic Social Engineering Attacks -- 5 Cryptographic Program Obfuscation: Practical Solutions and Application-Driven Models -- 6 Botnet-Based Attacks and Defense Mechanisms -- 7 Catastrophic Cyber-Physical Malware -- 8 Cross-VM Attacks: Attack Taxonomy, Defense Mechanisms, and New Directions.
520 _aCyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. .
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aData protection.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
650 2 4 _aComputer Communication Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13022
650 2 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
700 1 _aConti, Mauro.
_eeditor.
_0(orcid)0000-0002-3612-1934
_1https://orcid.org/0000-0002-3612-1934
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSomani, Gaurav.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPoovendran, Radha.
_eeditor.
_0(orcid)0000-0003-0269-8097
_1https://orcid.org/0000-0003-0269-8097
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319976426
776 0 8 _iPrinted edition:
_z9783319976440
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v72
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-97643-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cLIBRO_ELEC
999 _c242938
_d242937