Buch(elektronisch)2020

E-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3-4, 2019, Proceedings

In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. v.311

init.form.title.accessOptions

init.form.helpText.accessOptions

Verfügbarkeit an Ihrem Standort wird überprüft

Abstract

Intro -- Preface -- Organization -- Contents -- Software Security -- Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications -- 1 Introduction -- 2 Context -- 3 Related Works -- 4 Analytical Methodology -- 4.1 Characteristics of the Analyzed Apps -- 4.2 Analysis Tools -- 5 Results of the Analysis -- 5.1 Impacts of Permissions -- 5.2 Results -- 5.3 Discussion of the Results -- 5.4 Proposals for Solutions -- 6 Conclusion and Future Work -- References -- On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions and Outline -- 2 The Multi-layered Security Model -- 2.1 Data Integrity and Authenticity -- 2.2 Data Confidentiality -- 2.3 The Proposed Security Solution -- 2.4 The Key Exchange Algorithm -- 3 Performance Evaluation -- 3.1 Opportunistic Contacts -- 3.2 Impact of Security on Memory Usage -- 3.3 Impact of Security on Battery Usage -- 3.4 Impact of Security on Processing Time -- 3.5 Impact of Security on Hash Function Overheads -- 4 Conclusion and Future Work -- References -- Analysis of Software Vulnerabilities Using Machine Learning Techniques -- Abstract -- 1 Introduction -- 2 Methods for Analyzing Software Vulnerabilities -- 3 Techniques of Machine Learning and Data Mining -- 4 Related Work on the Use of Machine Learning -- 4.1 Prediction Vulnerabilities Based on Software Settings -- 4.2 Note -- 5 Proposed Approach -- 5.1 Methodology Approach -- 5.1.1 Present Rules that Must Comply with an Ethical Hacker -- 5.1.2 Building a Vulnerability Database from 2010 to 2018 -- 5.1.3 Preprocessing and Data Preparation -- 5.1.4 Management Unbalanced Data -- 5.1.5 Building Models -- 5.2 Results and Discussion -- 6 Conclusion -- References.

Sprachen

Englisch

Verlag

Springer International Publishing AG

ISBN

9783030415938

Problem melden

Wenn Sie Probleme mit dem Zugriff auf einen gefundenen Titel haben, können Sie sich über dieses Formular gern an uns wenden. Schreiben Sie uns hierüber auch gern, wenn Ihnen Fehler in der Titelanzeige aufgefallen sind.