Security and privacy in communication networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings / Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.).
International Workshop on Applications and Techniques in Cyber Security (2017 : Niagara Falls, Ont.); Lin, Xiaodong (Computer scientist), editor.; Ghorbani, Ali, 1954- editor.; Ren, Kui, editor.; Zhu, Sencun, editor.; Zhang, Aiqing, editor.; Workshop on Security and Privacy in the Internet of Things (1st : 2017 : Niagara Falls, Ont.), jointly held conference.; International Conference on Security and Privacy for Emerging Areas in Communications Networks (13th : 2017 : Niagara Falls, Ont.)
2018
TK5102.85
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security and privacy in communication networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings / Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.).
Meeting Name
International Workshop on Applications and Techniques in Cyber Security (2017 : Niagara Falls, Ont.)
ISBN
9783319788166 (electronic book)
3319788167 (electronic book)
9783319788159
3319788167 (electronic book)
9783319788159
Published
Cham, Switzerland : Springer, 2018.
Language
English
Description
1 online resource (xi, 339 pages) : illustrations.
Item Number
10.1007/978-3-319-78816-6 doi
Call Number
TK5102.85
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed May 4, 2018).
Added Author
Lin, Xiaodong (Computer scientist), editor.
Ghorbani, Ali, 1954- editor.
Ren, Kui, editor.
Zhu, Sencun, editor.
Zhang, Aiqing, editor.
Ghorbani, Ali, 1954- editor.
Ren, Kui, editor.
Zhu, Sencun, editor.
Zhang, Aiqing, editor.
Added Meeting Name
Workshop on Security and Privacy in the Internet of Things (1st : 2017 : Niagara Falls, Ont.), jointly held conference.
International Conference on Security and Privacy for Emerging Areas in Communications Networks (13th : 2017 : Niagara Falls, Ont.)
International Conference on Security and Privacy for Emerging Areas in Communications Networks (13th : 2017 : Niagara Falls, Ont.)
Series
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 239.
Available in Other Form
Print version: 9783319788159
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Access control
Language-based security
Malicious software
Network security
Cloud security
Software security
Operating system security
Privacy protection
Database security
Security models
Novel models
Techniques
Protocols
Algorithms
Architectures.
Language-based security
Malicious software
Network security
Cloud security
Software security
Operating system security
Privacy protection
Database security
Security models
Novel models
Techniques
Protocols
Algorithms
Architectures.