Secure It Systems : 17th Nordic Conference, Nordsec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings
Overview
Designed to Fail: A USB-Connected Reader for Online Banking.- Security Add-Ons for Mobile Platforms.- THAPS: Automated Vulnerability Scanning of PHP Applications.- Cyber security exercises and competitions as a platform for cyber security experiments.- The Development of Cyber Security Warning, Advice & Report Points.- Towards an Empirical Examination of IT Security Infrastructures in SME.- How to Select a Security Requirements Method? A comparative study with students and practitioners.- There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication.- Coinductive Unwinding of Security-Relevant.- Retooling and Securing Systemic Debugging.- Cracking Associative Passwords.- A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials.- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links.- Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users.- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning?.- Privacy-Friendly Cloud Storage for the Data Track.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9783642342097
- ISBN-10: 3642342094
- Publisher: Springer
- Publish Date: September 2012
- Dimensions: 9 x 6 x 0.6 inches
- Shipping Weight: 0.8 pounds
- Page Count: 247
Related Categories
