Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
Neuigkeiten Dienstag 9. Dezember 2025: Die Lesesäle der Deutschen Nationalbibliothek in Leipzig öffnen wegen einer Personalversammlung erst ab 13 Uhr. // Tuesday 9 December 2025: The reading rooms of the German National Library in Leipzig will open at 13:00 due to a staff assembly.
 
 

Ergebnis der Suche nach: tit all "Network Security"



Treffer 30 von 735 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1333803206
Titel Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / edited by Martin Andreoni
Person(en) Andreoni, Martin (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2024
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2024
Umfang/Format Online-Ressource, XXI, 399 p. 166 illus., 137 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-031-61485-9
Printed edition:: ISBN: 978-3-031-61487-3
Inhalt AIBlock – Application Intelligence and Blockchain Security: An End-to-End Secure Solution for IoMT Data Exchange -- EasyLog: An Effcient Kernel Logging Service for Machine Learning -- LM-cAPI:A Lite Model based on API Core Semantic Information for Malware Classification -- ACKI NACKI: a Probabilistic Proof-of-Stake consensus protocol with fast finality and parallelization. AIHWS – Artificial Intelligence in Hardware Security: FPGA Implementation of Physically Unclonable Functions based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks -- Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-based Side-channel Attacks -- Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attacks -- Diversity Algorithms for Laser Fault Injection -- One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis -- CNN architecture extraction on edge GPU -- Harnessing the Power of LLMs in Hardware Trojan Design -- Everything All At Once: Deep Learning Side-Channel Analysis Optimization Framework -- AIoTS – Artificial Intelligence and Industrial IoT Security: Device Fingerprinting in a Smart Grid CPS -- Power Quality Forecasting of Microgrids using Adaptive Privacy-Preserving Machine Learning -- Evaluation of Lightweight Machine Learning-based NIDS Techniques for Industrial IoT -- Measuring Cyber Resilience of IoT-enabled Critical National Infrastructure -- SCI – Secure Cryptographic Implementation: Towards Discovering Quantum-Threats for Applications using Open-Source Libraries -- Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests -- Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits -- A Command-Activated Hardware Trojan Detection Method Based on LU-NAR Framework -- Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems -- Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4
Persistent Identifier URN: urn:nbn:de:101:1-2406240406321.605298071844
DOI: 10.1007/978-3-031-61486-6
URL https://doi.org/10.1007/978-3-031-61486-6
ISBN/Einband/Preis 978-3-031-61486-6
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 14586
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 30 von 735
< < > <


E-Mail-IconAdministration