Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10446)
Part of the book sub series: Computer Communication Networks and Telecommunications (LNCCN)
Included in the following conference series:
Conference proceedings info: MMM-ACNS 2017.
Buy print copy
About this book
The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.
Similar content being viewed by others
Keywords
Table of contents (28 papers)
-
Critical Infrastructure Protection and Visualization
-
Security and Resilience of Network Systems
-
Adaptive Security
Other volumes
-
Computer Network Security
Editors and Affiliations
Bibliographic Information
Book Title: Computer Network Security
Book Subtitle: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings
Editors: Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-65127-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-65126-2Published: 06 August 2017
eBook ISBN: 978-3-319-65127-9Published: 10 August 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 362
Number of Illustrations: 141 b/w illustrations
Topics: Systems and Data Security, Computer Communication Networks, Computers and Society, Legal Aspects of Computing, Cryptology, System Performance and Evaluation