000921961 000__ 03462cam\a2200493Ii\4500 000921961 001__ 921961 000921961 005__ 20230306150650.0 000921961 006__ m\\\\\o\\d\\\\\\\\ 000921961 007__ cr\cn\nnnunnun 000921961 008__ 190617s2020\\\\si\\\\\\ob\\\\101\0\eng\d 000921961 019__ $$a1106161094 000921961 020__ $$a9789811391552$$q(electronic book) 000921961 020__ $$a9811391556$$q(electronic book) 000921961 020__ $$z9789811391545 000921961 0247_ $$a10.1007/978-981-13-9 000921961 035__ $$aSP(OCoLC)on1104790599 000921961 035__ $$aSP(OCoLC)1104790599$$z(OCoLC)1106161094 000921961 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dLQU$$dGW5XE$$dOCLCF$$dUKMGB$$dYDX 000921961 049__ $$aISEA 000921961 050_4 $$aUA10.5 000921961 08204 $$a355/.03$$223 000921961 1112_ $$aMultidisciplinary International Conference of Research Applied to Defense and Security$$d(2019 :$$cRio de Janeiro, Brazil) 000921961 24510 $$aDevelopments and advances in defense and security :$$bproceedings of MICRADS 2019 /$$ceditors, Álvaro Rocha and Robson Pacheo Pereira. 000921961 264_1 $$aSingapore :$$bSpringer,$$c[2020] 000921961 300__ $$a1 online resource. 000921961 336__ $$atext$$btxt$$2rdacontent 000921961 337__ $$acomputer$$bc$$2rdamedia 000921961 338__ $$aonline resource$$bcr$$2rdacarrier 000921961 4901_ $$aSmart innovation, systems, and technologies,$$x2190-3026 ;$$vvolume 152 000921961 504__ $$aIncludes bibliographical references and index. 000921961 5050_ $$aPart 1: Cybersecurity and Cyberdefense -- Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks -- Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs -- Chapter 3. Cybernetic Dependency Capacity -- Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens -- Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review -- Chapter 6. Is Cyber Warfare an Alternative? -- Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment -- Chapter 8. Mobile Communication Systems Evolution and Security -- Part 2: Computer Networks, Mobility and Pervasive Systems -- Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats -- Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN. 000921961 506__ $$aAccess limited to authorized users. 000921961 520__ $$aThis book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike. 000921961 588__ $$aOnline resource; title from PDF title page (viewed June 19, 2019). 000921961 650_0 $$aNational security$$vCongresses. 000921961 650_0 $$aComputer security$$vCongresses. 000921961 650_0 $$aMilitary policy$$vCongresses. 000921961 7001_ $$aRocha, Álvaro,$$eeditor. 000921961 7001_ $$aPereira, Robson Pacheco,$$eeditor. 000921961 830_0 $$aSmart innovation, systems, and technologies ;$$v152. 000921961 852__ $$bebk 000921961 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-13-9155-2$$zOnline Access$$91397441.1 000921961 909CO $$ooai:library.usi.edu:921961$$pGLOBAL_SET 000921961 980__ $$aEBOOK 000921961 980__ $$aBIB 000921961 982__ $$aEbook 000921961 983__ $$aOnline 000921961 994__ $$a92$$bISE