000931676 000__ 04971cam\a2200565Ia\4500 000931676 001__ 931676 000931676 005__ 20230306151528.0 000931676 006__ m\\\\\o\\d\\\\\\\\ 000931676 007__ cr\un\nnnunnun 000931676 008__ 200425s2020\\\\sz\\\\\\o\\\\\101\0\eng\d 000931676 019__ $$a1152541619$$a1153154583$$a1153945039$$a1154476901 000931676 020__ $$a9783030453718$$q(electronic book) 000931676 020__ $$a3030453715$$q(electronic book) 000931676 020__ $$z9783030453701 000931676 0247_ $$a10.1007/978-3-030-45 000931676 035__ $$aSP(OCoLC)on1152054571 000931676 035__ $$aSP(OCoLC)1152054571$$z(OCoLC)1152541619$$z(OCoLC)1153154583$$z(OCoLC)1153945039$$z(OCoLC)1154476901 000931676 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dLQU$$dYDX 000931676 049__ $$aISEA 000931676 050_4 $$aQA76.9.A25 000931676 08204 $$a005.8$$223 000931676 1112_ $$aFPS (Symposium)$$n(12th :$$d2019 :$$cToulouse, France) 000931676 24510 $$aFoundations and practice of security :$$b12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised selected papers /$$cAbdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro (eds.). 000931676 2463_ $$aFPS 2019 000931676 260__ $$aCham :$$bSpringer,$$c2020. 000931676 300__ $$a1 online resource (415 pages). 000931676 336__ $$atext$$btxt$$2rdacontent 000931676 337__ $$acomputer$$bc$$2rdamedia 000931676 338__ $$aonline resource$$bcr$$2rdacarrier 000931676 4901_ $$aLecture Notes in Computer Science ;$$v12056 000931676 4901_ $$aLNCS Sublibrary: SL 4, Security and cryptology 000931676 500__ $$aIncludes author index. 000931676 5050_ $$aMachine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities a nd Transactions History -- Towards Privacy-Aware Smart Surveillance. 000931676 506__ $$aAccess limited to authorized users. 000931676 520__ $$aThis book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography. 000931676 588__ $$aDescription based on print version record. 000931676 650_0 $$aComputer security$$vCongresses. 000931676 650_0 $$aData encryption (Computer science)$$vCongresses. 000931676 7001_ $$aBenzekri, Abdelmalek. 000931676 7001_ $$aBarbeau, Michel$$c(Computer scientist) 000931676 7001_ $$aGong, Guang,$$d1956- 000931676 7001_ $$aLaborde, Romain. 000931676 7001_ $$aGarcia-Alfaro, Joaquin. 000931676 77608 $$iPrint version:$$aBenzekri, Abdelmalek$$tFoundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers$$dCham : Springer International Publishing AG,c2020$$z9783030453701 000931676 830_0 $$aLecture notes in computer science ;$$v12056. 000931676 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000931676 852__ $$bebk 000931676 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-45371-8$$zOnline Access$$91397441.1 000931676 909CO $$ooai:library.usi.edu:931676$$pGLOBAL_SET 000931676 980__ $$aEBOOK 000931676 980__ $$aBIB 000931676 982__ $$aEbook 000931676 983__ $$aOnline 000931676 994__ $$a92$$bISE