↓ Skip to main content

Computer Security

Overview of attention for book
Cover of 'Computer Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM
  3. Altmetric Badge
    Chapter 2 On Leveraging Coding Habits for Effective Binary Authorship Attribution
  4. Altmetric Badge
    Chapter 3 Synthesis of a Permissive Security Monitor
  5. Altmetric Badge
    Chapter 4 MobileFindr: Function Similarity Identification for Reversing Mobile Binaries
  6. Altmetric Badge
    Chapter 5 Strain : A Secure Auction for Blockchains
  7. Altmetric Badge
    Chapter 6 Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
  8. Altmetric Badge
    Chapter 7 Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews
  9. Altmetric Badge
    Chapter 8 Efficient Proof Composition for Verifiable Computation
  10. Altmetric Badge
    Chapter 9 Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
  11. Altmetric Badge
    Chapter 10 Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
  12. Altmetric Badge
    Chapter 11 How Secure Is Green IT? The Case of Software-Based Energy Side Channels
  13. Altmetric Badge
    Chapter 12 Phishing Attacks Modifications and Evolutions
  14. Altmetric Badge
    Chapter 13 SILK-TV : Secret Information Leakage from Keystroke Timing Videos
  15. Altmetric Badge
    Chapter 14 A Formal Approach to Analyzing Cyber-Forensics Evidence
  16. Altmetric Badge
    Chapter 15 Beneath the Bonnet: A Breakdown of Diagnostic Security
  17. Altmetric Badge
    Chapter 16 Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
  18. Altmetric Badge
    Chapter 17 Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets
  19. Altmetric Badge
    Chapter 18 PwIN – Pwning Intel piN: Why DBI is Unsuitable for Security Applications
  20. Altmetric Badge
    Chapter 19 POR for Security Protocol Equivalences
  21. Altmetric Badge
    Chapter 20 Automated Identification of Desynchronisation Attacks on Shared Secrets
  22. Altmetric Badge
    Chapter 21 Stateful Protocol Composition
  23. Altmetric Badge
    Chapter 22 Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs
  24. Altmetric Badge
    Chapter 23 Anonymous Single-Sign-On for n Designated Services with Traceability
  25. Altmetric Badge
    Chapter 24 Efficiently Deciding Equivalence for Standard Primitives and Phases
  26. Altmetric Badge
    Chapter 25 DigesTor : Comparing Passive Traffic Analysis Attacks on Tor
  27. Altmetric Badge
    Chapter 26 Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
  28. Altmetric Badge
    Chapter 27 Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics
  29. Altmetric Badge
    Chapter 28 Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
  30. Altmetric Badge
    Chapter 29 SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

blogs
2 blogs
twitter
21 X users

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
10 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security
Published by
Springer International Publishing, October 2018
DOI 10.1007/978-3-319-99073-6
ISBNs
978-3-31-999072-9, 978-3-31-999073-6
Editors

Lopez, Javier, Zhou, Jianying, Soriano, Miguel

X Demographics

X Demographics

The data shown below were collected from the profiles of 21 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 10 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 10 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 3 30%
Student > Postgraduate 2 20%
Student > Ph. D. Student 1 10%
Researcher 1 10%
Unknown 3 30%
Readers by discipline Count As %
Computer Science 5 50%
Engineering 2 20%
Unknown 3 30%