TY - BOOK AU - Roychoudhury,Abhik AU - Liu,Yang ED - Singapore Cyber-Security R & D Conference ED - IOS Press. TI - A systems approach to cyber security: proceedings of the 2nd Singapore Cyber-Security R & D Conference (SG-CRC 2017) T2 - Cryptology and information security series SN - 9781614997443 AV - QA76.9.A25 C9186 2017eb U1 - 005.8 23 PY - 2017///] CY - Amsterdam PB - IOS Press B.V. KW - Computer security KW - Congresses KW - Internet KW - Security measures KW - Sécurité informatique KW - Congrès KW - Sécurité KW - Mesures KW - COMPUTERS KW - Security KW - General KW - bisacsh KW - fast KW - Conference papers and proceedings N1 - Includes bibliographical references and indexes; Designing Security-Aware Architectures and Systems; RubyB. Lee --; Verification of Security Protocols and the Secrecy Problem; Luke Ong --; Let's Stick Together: Digitally Ensuring Physical Proximity; Sjouke Mauw --; Chat-App Decryption Key Extraction Through Information Flow Analysis; Zhongmin Dai, Sufatrio, Tong-Wei Chua, Dinesh Kumar Balakrishnan and Vrizlynn L.L. Thing --; VeriFormal: An Executable Formal Model of a Hardware Description Language; Wilayat Khan, A/wen Tiu and David Sanan --; Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach; Matthew Smith and Elisabeth Pate-Cornell --; A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification; Victor Pomponiu and Vrizlynn L.L. Thing --; Mind the Gap: Security Analysis of Metro Platform Screen Door System; Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong and Jianying Zhou --; Attribute-Based Secure Messaging in the Public Cloud; Zhi Yuan Poh, Hui Cui, Robert H Deng and Yingjiu Li --; Faster ECC over F; (feat. PMULL); Hwajung Seo --; Scholarly Digital Libraries as a Platform for Mal ware Distribution; Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Liar Rokach, Yuval Elovici and Lee Giles --; Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification; Chien Eao Lee, Lilei Zheng, Ying Zhang and Vrizlynn L.L. Thing --; Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs; G. Sumathi, L Srivani, D. Thirugnana Murthy, Anish Kumar and K Madhusoodanan UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1640393 ER -