↓ Skip to main content

Secure IT Systems

Overview of attention for book
Cover of 'Secure IT Systems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Effectiveness of Intersection Attacks in Anonymous Microblogging
  3. Altmetric Badge
    Chapter 2 Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness
  4. Altmetric Badge
    Chapter 3 Location Privacy, 5G AKA, and Enhancements
  5. Altmetric Badge
    Chapter 4 Local Differential Privacy for Private Construction of Classification Algorithms
  6. Altmetric Badge
    Chapter 5 IMSI Probing: Possibilities and Limitations
  7. Altmetric Badge
    Chapter 6 Honeysweeper : Towards Stealthy Honeytoken Fingerprinting Techniques
  8. Altmetric Badge
    Chapter 7 Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters
  9. Altmetric Badge
    Chapter 8 DeCrypto: Finding Cryptocurrency Miners on ISP Networks
  10. Altmetric Badge
    Chapter 9 Detection of Voice Conversion Spoofing Attacks Using Voiced Speech
  11. Altmetric Badge
    Chapter 10 A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
  12. Altmetric Badge
    Chapter 11 GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans
  13. Altmetric Badge
    Chapter 12 Simplex : Repurposing Intel Memory Protection Extensions for Secure Storage
  14. Altmetric Badge
    Chapter 13 Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
  15. Altmetric Badge
    Chapter 14 How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs
  16. Altmetric Badge
    Chapter 15 Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
  17. Altmetric Badge
    Chapter 16 Malware Analysis with Symbolic Execution and Graph Kernel
  18. Altmetric Badge
    Chapter 17 WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
  19. Altmetric Badge
    Chapter 18 Maraudrone’s Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
  20. Altmetric Badge
    Chapter 19 VinciDecoder : Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack
  21. Altmetric Badge
    Chapter 20 Actionable Cyber Threat Intelligence for Automated Incident Response
Attention for Chapter 8: DeCrypto: Finding Cryptocurrency Miners on ISP Networks
Altmetric Badge

Mentioned by

twitter
5 X users

Citations

dimensions_citation
1 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
DeCrypto: Finding Cryptocurrency Miners on ISP Networks
Chapter number 8
Book title
Secure IT Systems
Published by
Springer, Cham, January 2022
DOI 10.1007/978-3-031-22295-5_8
Book ISBNs
978-3-03-122294-8, 978-3-03-122295-5
Authors

Plný, Richard, Hynek, Karel, Čejka, Tomáš

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.