SULJE VALIKKO

avaa valikko

Sotiris Ioannidis | Akateeminen Kirjakauppa

Haullasi löytyi yhteensä 8 tuotetta
Haluatko tarkentaa hakukriteerejä?



Proceedings of the 3rd European Conference on Computer Network Defense
Vasilios Siris; Sotiris Ioannidis; Kostas Anagnostakis; Panagiotis Trimintzios
Springer-Verlag New York Inc. (2008)
Kovakantinen kirja
129,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Proceedings of the 3rd European Conference on Computer Network Defense
Vasilios Siris (ed.); Sotiris Ioannidis (ed.); Kostas Anagnostakis (ed.); Panagiotis Trimintzios (ed.)
Springer (2011)
Pehmeäkantinen kirja
129,90
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Computer Security – ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30,
Ioannis Askoxylakis; Sotiris Ioannidis; Sokratis Katsikas; Catherine Meadows
Springer International Publishing AG (2016)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Computer Security – ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30,
Ioannis Askoxylakis; Sotiris Ioannidis; Sokratis Katsikas; Catherine Meadows
Springer International Publishing AG (2016)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-
Michael Bailey; Thorsten Holz; Manolis Stamatogiannakis; Sotiris Ioannidis
Springer Nature Switzerland AG (2018)
Pehmeäkantinen kirja
83,40
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27
Apostolos P. Fournaris; Manos Athanatos; Konstantinos Lampropoulos; Sotiris Ioannidis; George Hatzivasilis; Ernest Damiani
Springer Nature Switzerland AG (2020)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, P
Thorsten Holz; Sotiris Ioannidis
Springer International Publishing AG (2014)
Pehmeäkantinen kirja
47,70
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK,
George Hatzivasilis; Sotiris Ioannidis
Springer Nature Switzerland AG (2020)
Pehmeäkantinen kirja
49,60
Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
Proceedings of the 3rd European Conference on Computer Network Defense
129,90 €
Springer-Verlag New York Inc.
Sivumäärä: 166 sivua
Asu: Kovakantinen kirja
Painos: 2009
Julkaisuvuosi: 2008, 04.12.2008 (lisätietoa)
Kieli: Englanti
Tuotesarja: Lecture Notes in Electrical Engineering 30
The 3rd European Conference on Computer Network Defense took place in September 2007 at Aldemar Hotel, in Heraklion, Crete, Greece in cooperation with the European Network and Information Security Agency (ENISA). The theme of the conference was the protection of computer networks. The conference drew participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. The conference was a great success, with 6 refereed papers and 6 invited presentations on topics ranging from high assurance networks of virtual machines to signaling vulnerabilities in wiretapping systems. This book contains the refereed as well as refereed papers. We are greatful to the authors and presenters for their contributions, as well as the participants of EC2N’07 for making the conference a success. We are looking forward to a successful EC2ND event in 2008. K. G. Anagnostakis, S. Ioannidis, V. Siris Contents 1 Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting ........................................1 Michael Valkering, Asia Slowinska, and Herbert Bos 1 Introduction ......................................................................................... 1 2 Architecture ......................................................................................... 3 2.1 Tracking Issues .............................................................................. 4 2.2 Retainting ...................................................................................... 6 2.2.1 Determining the Tag ............................................................. 6 2.2.2 Identifying the SSL Conversation ........................................ 8 2.3 Interposition Details...................................................................... 9 3 Signature Generation ........................................................................... 9 3.1 Pattern-Based Signatures ............................................................. 10 3.2 Signatures for Polymorphic Buffer Overflows ............................ 13 4 Filters ................................................................................................. 14 5 Results ............................................................................................... 15 6 Related Work ..................................................................................... 17 7 Conclusions ....................................................................................... 18 References ............................................................................................ 18 2 Towards High Assurance Networks of Virtual Machines...............21

Tuotetta lisätty
ostoskoriin kpl
Siirry koriin
LISÄÄ OSTOSKORIIN
Tilaustuote | Arvioimme, että tuote lähetetään meiltä noin 3-4 viikossa | Tilaa jouluksi viimeistään 27.11.2024
Myymäläsaatavuus
Helsinki
Tapiola
Turku
Tampere
Proceedings of the 3rd European Conference on Computer Network Defensezoom
Näytä kaikki tuotetiedot
ISBN:
9780387855547
Sisäänkirjautuminen
Kirjaudu sisään
Rekisteröityminen
Oma tili
Omat tiedot
Omat tilaukset
Omat laskut
Lisätietoja
Asiakaspalvelu
Tietoa verkkokaupasta
Toimitusehdot
Tietosuojaseloste