Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. v.311
Intro -- Preface -- Organization -- Contents -- Software Security -- Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications -- 1 Introduction -- 2 Context -- 3 Related Works -- 4 Analytical Methodology -- 4.1 Characteristics of the Analyzed Apps -- 4.2 Analysis Tools -- 5 Results of the Analysis -- 5.1 Impacts of Permissions -- 5.2 Results -- 5.3 Discussion of the Results -- 5.4 Proposals for Solutions -- 6 Conclusion and Future Work -- References -- On the Relevance of Using Multi-layered Security in the Opportunistic Internet-of-Things -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions and Outline -- 2 The Multi-layered Security Model -- 2.1 Data Integrity and Authenticity -- 2.2 Data Confidentiality -- 2.3 The Proposed Security Solution -- 2.4 The Key Exchange Algorithm -- 3 Performance Evaluation -- 3.1 Opportunistic Contacts -- 3.2 Impact of Security on Memory Usage -- 3.3 Impact of Security on Battery Usage -- 3.4 Impact of Security on Processing Time -- 3.5 Impact of Security on Hash Function Overheads -- 4 Conclusion and Future Work -- References -- Analysis of Software Vulnerabilities Using Machine Learning Techniques -- Abstract -- 1 Introduction -- 2 Methods for Analyzing Software Vulnerabilities -- 3 Techniques of Machine Learning and Data Mining -- 4 Related Work on the Use of Machine Learning -- 4.1 Prediction Vulnerabilities Based on Software Settings -- 4.2 Note -- 5 Proposed Approach -- 5.1 Methodology Approach -- 5.1.1 Present Rules that Must Comply with an Ethical Hacker -- 5.1.2 Building a Vulnerability Database from 2010 to 2018 -- 5.1.3 Preprocessing and Data Preparation -- 5.1.4 Management Unbalanced Data -- 5.1.5 Building Models -- 5.2 Results and Discussion -- 6 Conclusion -- References.
Problem melden