Multimedia Security

合集下载

金士顿e MMC 5.1嵌入式多媒体卡(e

金士顿e MMC 5.1嵌入式多媒体卡(e

Embedded Multi-Media Card(e•MMC™ 5.1)EMMC16G-IB29-PE90EMMC32G-IB29-PE90EMMC64G-IB29-PE90v1.0Product Features•Packaged managed NAND flash memory with e•MMC™ 5.1 interface•Backward compatible with all prior e•MMC™ specification revisions•153-ball JEDEC FBGA RoHS Compliant package•Operating voltage range:o VCCQ = 1.8 V/3.3 Vo VCC = 3.3 V•Operating Temperature (T case) - 40C to +85C•Storage Temperature -55C to +85C•Compliant with e•MMC™ 5.1 JEDEC Standard Number JESD84-B51•Factory configured with pseudo Single Level Cell (pSLC) mode for enhanced reliability and performance•Factory configured with reliable writee•MMC™ Specific Feature Support•High-speed e•MMC™ protocol•Variable clock frequencies of 0-200MHz•Ten-wire bus interface (clock, 1 bit command, 8 bit data bus) with an optional hardware reset •Supports three different data bus widths: 1 bit(default), 4 bits, 8 bits•Bus Modes:o Single data transfer rate: up to 52MB/s (using 8 parallel data lines at 52MHz)o Dual data rate mode (DDR-104) : up to 104MB/s @ 52MHzo High speed, single data rate mode (HS-200) : up to 200MB/s @ 200MHzo High speed, dual data rate mode (HS-400) : up to 400MB/s @ 200MHz•Supports alternate boot operation mode to provide a simple boot sequence methodo Supports SLEEP/AWAKE (CMD5)o Host initiated explicit sleep mode for power saving•Enhanced write protection with permanent and partial protection options•Multiple user data partition with enhanced attribute for increased reliability•Error free memory accesso Cyclic Redundancy Code (CRC) for reliable command and data communicationo Internal error correction code (ECC) for improved data storage integrityo Internal enhanced data management algorithmo Data protection for sudden power failure during program operations•Securityo Secure bad block erase commandso Enhanced write protection with permanent and partial protection options•Power off notification for sleep•Field firmware update (FFU)•Production state awareness•Device health report•Command queuing•Enhanced strobe•Cache flushing report•Cache barrier•Background operation control & High Priority Interrupt (HPI)•RPMB throughput improvement•Secure write protection•Pre EOL information•Optimal sizeProduct DescriptionKingston’s e•MMC™ products conform to the JEDEC e•MMC™ 5.1standard. These devices are an ideal universal storage solution for many commercial and industrial applications. In a single integrated packaged device, e•MMC™ combines triple-level cell (TLC) NAND flash memory with an onboard e•MMC™ controller, providing an industry standard interface to the host system. The integrated e•MMC™ controller directly manages NAND flash media which relieves the host processor of these tasks, including flash media error control, wear-leveling, NAND flash management and performance optimization. Future revision to the JEDEC e•MMC™ standard will always maintain backward compatibility. The industry standard interface to the host processor ensures compatibility across future NAND flash generations as well, easing product sustainment throughout the product life cycle. ConfigurationsKingston’s e•MMC™ products support a variety of configurations that allow the e•MMC™ device to be tailored to your specific application needs. The most popular configurations described below are each offered under standard part numbers.Standard TLC – By default the e•MMC™ device is configured with the NAND flash in a standard TLC mode. This configuration provides reasonable performance and reliability for many applications. Pseudo Single Level Cell (pSLC) – The TLC NAND flash in the Kingston e•MMC™ device can be configured to further improve device endurance, data retention, reliability and performance over the standard TLC configuration. This is done by converting the NAND TLC cells to a pseudo single level cell (SLC) configuration. In this configuration, along with the performance and reliability gains, the device capacity is reduced by 2/3 of the capacity. This one-time configuration is achieved by setting the e•MMC™ enhanced attribute for the hardware partition.Kingston e•MMC™ can be ordered preconfigured with the option of reliable write or pSLC at no additional cost. Standard TLC devices can also be one-time configured in-field by following the procedures outlined in the JEDEC e•MMC™ specification. The JEDEC e•MMC™ specification allows for many additional configurations such as up to 4 additional general purpose (GPn) hardware partitions each with the option to support pSLC and reliable write. Additionally, Kingston provides a content loading service that can streamline your product assembly while reducing production costs. For more information, contact your Kingston representative.Kingston e•MMC™ devices are fully compliant with the JEDEC Standard Specification No. JESD84-B51. This datasheet provides technical specifications for Kingston’s family of e•MMC™ devices. Refer to the JEDEC e•MMC™ standard for specific information related to e•MMC™ device function and operation. See: /sites/default/files/docs/JESD84-B51.pdfe•MMC™ Mode and ControllerTLC mode using PS8229 - Leading edge 3D NAND flash technology in TLC mode rated to 3,000 endurance cycles.- Strong data protection with LDPC Error control- Improved data integrity with end-to-end data protection.pSLC mode using PS8229 - Leading edge 3D NAND flash technology in pSLC mode.- Strong data protection with LDPC Error control- Improved data integrity with end-to-end data protection.Part NumberingFigure 1 – Part Number FormatEMMC 16G - xxxx - PE90A B C DPart Number FieldsA: Product Family : EMMCB: Device Capacity : Available capacities of 16GB – 64GBC: Hardware Revision and ConfigurationD: Device Firmware Revision and ConfigurationTable 1 - Device SummaryDevice PerformanceTable 2 below provides sequential read and write speeds for all capacities. Performance numbers can vary under different operating conditions. Values are given at HS400 bus mode. Contact your Kingston Representative for performance numbers using other bus modes.Power ConsumptionDevice current consumption for various device configurations is defined in the power class fields of the EXT_CSD register. Power consumption values are summarized in Table 3 below.Device and Partition CapacityThe device NAND flash capacity is divided across two boot partitions (2048 KB each), a Replay Protected Memory Block (RPMB) partition (512 KB), and the main user storage area. Four additional general purpose storage partitions can be created from the user partition. These partitions can be factory preconfigured or configured in-field by following the procedure outlined in section 6.2 of the JEDEC e•MMC™ specification JESD84-B51. A small portion of the NAND storage capacity is used for the storage of the onboard controller firmware and mapping tables. Additionally, several NAND blocks are held in reserve to boost performance and extend the life of the e•MMC™ device. Table 4 identifies the specific capacity of each partition. This information is reported in the device EXT_CSD register. The contents of this register are also listed in the Appendix.e•MMC™ Bus ModesKingston e•MMC™ devices support all bus modes defined in the JEDEC e•MMC™ 5.1 specification. These modes are summarized in Table 6 below.Signal DescriptionTable 7 - e•MMC™ Signals Name Type DescriptionCLK I Clock: Each cycle of this signal directs a one bit transfer on the command and either a one bit (1x) or a two bits transfer (2x) on all the data lines. The frequency may vary between zero and the maximum clock frequency.DAT[7:0] I/O/PP Data: These are bidirectional data channels. The DAT signals operate in push-pull mode. These bidirectional signals are driven by either the e•MMC™ device or the host controller. By default, after power up or reset, only DAT0 is used for data transfer. A wider data bus can be configured for data transfer, using either DAT0-DAT3 or DAT0-DAT7, by the e•MMC™ host controller. The e•MMC™ device includes internal pull-ups for data lines DAT1-DAT7. Immediately after entering the 4-bit mode, the device disconnects the internal pull ups of lines DAT1, DAT2, and DAT3. Correspondingly, immediately after entering to the 8-bit mode, the device disconnects the internal pull-ups of lines DAT1–DAT7.CMD I/O/PP/OD Command: This signal is a bidirectional command channel used for device initialization and transfer of commands. The CMD signal has two operation modes: open-drain for initialization mode, and push-pull for fast command transfer. Commands are sent from the e•MMC™ host controller to the e•MMC™ device and responses are sent from the device to the host.DS O This signal is generated by the device and used for output in HS400 mode. The frequency of this signal follows the frequency of CLK. For data output each cycle of this signal directs two bits transfer(2x) on the data - one bit for positive edge and the other bit for negative edge. For CRC status response output and CMD response output (enabled only HS400 enhanced strobe mode), the CRC status and CMD Response are latched on the positive edge only, and don't care on the negative edge.RST_n I Hardware Reset: By default, hardware reset is disabled and must be enabled in the EXT_CSD register if used. Otherwise, it can be left un-connected.RFU - Reserved for future use: These pins are not internally connected. Leave floatingNC - Not Connected: These pins are not internally connected. Signals can be routed through these balls to ease printed circuit board design. See Kingston’s Design Guidelines for further details.VSF - Vendor Specific Function: These pins are not internally connectedVddi - Internal Voltage Node: Note that this is not a power supply input. This pin provides access to the output of an internal voltage regulator to allow for the connection of an external Creg capacitor. See Kingston’s Design Guidelines for further details.Vcc S Supply voltage for core Vccq S Supply voltage for I/ODesign GuidelinesDesign guidelines are outlined in a separate document. Contact your Kingston Representative for more information.Package DimensionsFigure 2 – Package DimensionsFigure 3 – Ball Pattern DimensionsBall Assignment (153 ball)Table 8 – Ball Assignment, Top View (HS400)1 2 3 4 5 6 7 8 9 10 11 12 13 14A NC NC DAT0 DAT1 DAT2 Vss RFU NC NC NC NC NC NC NC AB NC DAT3 DAT4 DAT5 DAT6 DAT7 NC NC NC NC NC NC NC NC BC NC Vddi NC Vssq NC Vccq NC NC NC NC NC NC NC NC CD NC NC NC NC NC NC NC DE NC NC NC RFU Vcc Vss VSF VSF VSF NC NC NC EF NC NC NC Vcc VSF NC NC NC FG NC NC RFU Vss VSF NC NC NC GH NC NC NC DS Vss NC NC NC H J NC NC NC Vss Vcc NC NC NC J K NC NC NC RST_n RFU RFU Vss Vcc VSF NC NC NC K L NC NC NC NC NC NC L M NC NC NC Vccq CMD CLK NC NC NC NC NC NC NC NC M N NC Vssq NC Vccq Vssq NC NC NC NC NC NC NC NC NC N P NC NC Vccq Vssq Vccq Vssq RFU NC NC RFU NC NC NC NC P1 2 3 4 5 6 7 8 9 10 11 12 13 14 Note: VSF, RFU and NC balls are not electrically connected. RFU balls may be defined with functionality by the Joint Electron Device Engineering Council (JEDEC) in future revisions of the e•MMC™ standard. Please refer to Kingston’s design guidelines for more info.Device MarkingFigure 4 - EMMC Package Marking240xxxx-xxx.xxxxYYWW PPPPPPPPxxxxxxx-xxxx2xxxxxxTAIWANKingston Logo240xxxx-xxx.xxxx:Internal control numberYYWW:Date code (YY– Last 2 digits ofyear, WW- Work week)PPPPPPPP: Internal control numberxxxxxxx-xxxx Sales P/N2xxxxxx : Internal control numberCountry:TAIWANCard Identification Register (CID)The Card Identification (CID) register is a 128-bit register that contains device identification information used during the e•MMC™ protocol device identification phase. Refer to JEDEC Standard Specification No.JESD84-B51 for details.Field Byte ValueMID [127:120] 0x70reserved [119:114] 0x00CBX [113:112] 0x01OID [111:104] 0x00PNM [103:56 ] IB2916(16G) IB2932(32G) IB2964(64G)PRV [ 55:48 ] 0x90PSN [ 47:16 ] RandomMDT [ 15:8 ] month, yearCRC [ 7:1 ] Follows JEDEC Standard reserved [ 0:0 ] 0x01Card Specific Data Register [CSD]The Card-Specific Data (CSD) register provides information on how to access the contents stored in e•MMC™. The CSD registers are used to define the error correction type, maximum data access time, data transfer speed, data format…etc. For details, refer to section 7.3 of the JEDEC Standard Specification No.JESD84-B51.Field Byte ValueCSD_Structure [127:126] 0x03 (V2.0)SPEC_VER [125:122] 0x04 (V4.0~4.2)reserved [121:120] 0x00TAAC [119:112] 0x4F (40ms)NSAC [111:104] 0x01TRAN_SPEED [103:96 ] 0x32 (26Mbit/s)CCC [ 95:84 ] 0x0F5READ_BL_LEN [ 83:80 ] 0x09 (512 Bytes)READ_BL_PARTIAL [ 79:79 ] 0x00WRITE_BLK_MISALIGN [ 78:78 ] 0x00READ_BLK_MISALIGN [ 77:77 ] 0x00DSR_IMP [ 76:76 ] 0x00reserved [ 75:74 ] 0x00C_SIZE [ 73:62 ] 0xFFFVDD_R_CURR_MIN [ 61:59 ] 0x07 (100mA)VDD_R_CURR_MAX [ 58:56 ] 0x07 (200mA)VDD_W_CURR_MIN [ 55:53 ] 0x07 (100mA)VDD_W_CURR_MAX [ 52:50 ] 0x07 (200mA)C_SIZE_MULT [ 49:47 ] 0x07 (512 Bytes)ERASE_GRP_SIZE [ 46:42 ] 0x1FERASE_GRP_MULT [ 41:37 ] 0x1FWP_GRP_SIZE [ 36:32 ] 0x0FWP_GRP_ENABLE [ 31:31 ] 0x01DEFAULT_ECC [ 30:29 ] 0x00R2W_FACTOR [ 28:26 ] 0x02WRITE_BL_LEN [ 25:22 ] 0x09 (512 Bytes)WRITE_BL_PARTIAL [ 21:21 ] 0x00reserved [ 20:17 ] 0x00CONTENT_PROT_APP [ 16:16 ] 0x00FILE_FORMAT_GRP [ 15:15 ] 0x00COPY [ 14:14 ] 0x00PERM_WRITE_PROTECT [ 13:13 ] 0x00TMP_WRITE_PROTECT [ 12:12 ] 0x00FILE_FORMAT [ 11:10 ] 0x00Field Byte ValueECC [ 9:8 ] 0x00CRC [ 7:1 ] Follow JEDEC Standard reserved [ 0:0 ] 0x01Extended Card Specific Data Register [EXT_CSD]The Extended CSD register defines the Device properties and selected modes. It is 512 bytes long. The most significant 320 bytes are the Properties segment, which defines the Device capabilities and cannot be modified by the host. The lower 192 bytes are the Modes segment, which defines the configuration the Device is working in. These modes can be changed by the host by means of the SWITCH command. For details, refer to section 7.4 of the JEDEC Standard Specification No.JESD84-B51.Field Byte ValueReserved [511:506] 0EXT_SECURITY_ERR [505:505] 0x00S_CMD_SET [504:504] 0x01HPI_FEATURES [503:503] 0x01BKOPS_SUPPORT [502:502] 0x01MAX_PACKED_READS [501:501] 0x3CMAX_PACKED_WRITES [500:500] 0x20DATA_TAG_SUPPORT [499:499] 0x01TAG_UNIT_SIZE [498:498] 0x03TAG_RES_SIZE [497:497] 0x00CONTEXT_CAPABILITIES [496:496] 0x05LARGE_UNIT_SIZE_M1 [495:495] 0x17(16G) 0x2F(32G) 0x5F(64G)EXT_SUPPORT [494:494] 0x03 SUPPORTED_MODES [493:493] 0x01FFU_FEATURES [492:492] 0x00 OPERATION_CODE_TIMEOUT [491:491] 0x00FFU_ARG [490:487] 65535 BARRIER_SUPPORT [486:486] 0x01Reserved [485:309] 0CMDQ_SUPPORT [308:308] 0x01CMDQ_DEPTH [307:307] 0x0FReserved [306:306] 0x00 NUMBER_OF_FW_SECTORS_CORRECTLY_PROGRAMMED [305:302] 0 VENDOR_PROPRIETARY_HEALTH_REPORT [301:270] 0 DEVICE_LIFE_TIME_EST_TYP_B [269:269] 0x01DEVICE_LIFE_TIME_EST_TYP_A [268:268] 0x01PRE_EOL_INFO [267:267] 0x01 OPTIMAL_READ_SIZE [266:266] 0x01OPTIMAL_WRITE_SIZE [265:265] 0x08Field Byte Value OPTIMAL_TRIM_UNIT_SIZE [264:264] 0x01 DEVICE_VERSION [263:262] 0FIRMWARE_VERSION [261:254] 0x90 PWR_CL_DDR_200_360 [253:253] 0x00 CACHE_SIZE [252:249] 1024 GENERIC_CMD6_TIME [248:248] 0x32 POWER_OFF_LONG_TIME [247:247] 0xFF BKOPS_STATUS [246:246] 0x00 CORRECTLY_PRG_SECTORS_NUM [245:242] 0 INI_TIMEOUT_AP [241:241] 0x64 CACHE_FLUSH_POLICY [240:240] 0x01 PWR_CL_DDR_52_360 [239:239] 0x00 PWR_CL_DDR_52_195 [238:238] 0x00PWR_CL_200_195 [237:237] 0x00PWR_CL_200_130 [236:236] 0x00 MIN_PERF_DDR_W_8_52 [235:235] 0x00 MIN_PERF_DDR_R_8_52 [234:234] 0x00 Reserved [233:233] 0x00TRIM_MULT [232:232] 0x11(16G) 0x11(32G) 0x22(64G)SEC_FEATURE_SUPPORT [231:231] 0x55 SEC_ERASE_MULT [230:230] 0xF7 SEC_TRIM_MULT [229:229] 0xF7 BOOT_INFO [228:228] 0x07Reserved [227:227] 0x00 BOOT_SIZE_MULT [226:226] 0x20ACC_SIZE [225:225] 0x07(16G) 0x08(32G) 0x09(64G)HC_ERASE_GRP_SIZE [224:224] 0x01ERASE_TIMEOUT_MULT [223:223] 0x11(16G) 0x11(32G) 0x22(64G)REL_WR_SEC_C [222:222] 0x01HC_WP_GRP_SIZE [221:221] 0x10 S_C_VCC [220:220] 0x08S_C_VCCQ [219:219] 0x08 PRODUCTION_STATE_AWARENESS_TIMEOUT [218:218] 0x14 S_A_TIMEOUT [217:217] 0x15 SLEEP_NOTIFICATION_TIME [216:216] 0x0FField Byte ValueSEC_COUNT [215:212] 10207232 (16G) 20414464 (32G) 40828928 (64G)SECURE_WP_INFO [211:211] 0x01 MIN_PERF_W_8_52 [210:210] 0x08 MIN_PERF_R_8_52 [209:209] 0x08 MIN_PERF_W_8_26_4_52 [208:208] 0x08 MIN_PERF_R_8_26_4_52 [207:207] 0x08 MIN_PERF_W_4_26 [206:206] 0x08 MIN_PERF_R_4_26 [205:205] 0x08 Reserved [204:204] 0x00 PWR_CL_26_360 [203:203] 0x00 PWR_CL_52_360 [202:202] 0x00 PWR_CL_26_195 [201:201] 0x00 PWR_CL_52_195 [200:200] 0x00 PARTITION_SWITCH_TIME [199:199] 0xFF OUT_OF_INTERRUPT_TIME [198:198] 0xFF DRIVER_STRENGTH [197:197] 0x1F DEVICE_TYPE [196:196] 0x57 Reserved [195:195] 0x00 CSD_STRUCTURE [194:194] 0x02 Reserved [193:193] 0x00 EXT_CSD_REV [192:192] 0x08 CMD_SET [191:191] 0x00Reserved [190:190] 0x00 CMD_SET_REV [189:189] 0x00 Reserved [188:188] 0x00 POWER_CLASS [187:187] 0x00 Reserved [186:186] 0x00HS_TIMING [185:185] 0x01 STROBE_SUPPORT [184:184] 0x01 BUS_WIDTH [183:183] 0x02Reserved [182:182] 0x00 ERASED_MEM_CONT [181:181] 0x00 Reserved [180:180] 0x00 PARTITION_CONFIG [179:179] 0x00 BOOT_CONFIG_PROT [178:178] 0x00 BOOT_BUS_CONDITIONS [177:177] 0x00 Reserved [176:176] 0x00 ERASE_GROUP_DEF [175:175] 0x00 BOOT_WP_STATUS [174:174] 0x00C - 4Field Byte Value BOOT_WP [173:173] 0x00 Reserved [172:172] 0x00 USER_WP [171:171] 0x00 Reserved [170:170] 0x00 FW_CONFIG [169:169] 0x00 RPMB_SIZE_MULT [168:168] 0x20 WR_REL_SET [167:167] 0x00 WR_REL_PARAM [166:166] 0x15 SANITIZE_START [165:165] 0x00 BKOPS_START [164:164] 0x00 BKOPS_EN [163:163] 0x00 RST_n_FUNCTION[162:162] 0x00 HPI_MGMT[161:161] 0x00 PARTITIONING_SUPPORT [160:160] 0x07 MAX_ENH_SIZE_MULT [159:157] 623(16G) 1246(32G) 2492(64G) PARTITIONS_ATTRIBUTE[156:156] 0x01 PARTITION_SETTING_COMPLETED[155:155] 0x01 GP_SIZE_MULT_4 [154:152] 0 GP_SIZE_MULT_3 [151:149] 0 GP_SIZE_MULT_2 [148:146] 0 GP_SIZE_MULT_1[145:143] 0 ENH_SIZE_MULT[142:140] 623(16G) 1246(32G) 2492(64G)ENH_START_ADDR[139:136] 0 Reserved[135:135] 0x00 SEC_BAD_BLK_MGMNT[134:134] 0x00 PRODUCTION_STATE_AWARENESS[133:133] 0x00 TCASE_SUPPORT [132:132] 0x00 PERIODIC_WAKEUP[131:131] 0x00 PROGRAM _CID_CSD_DDR_SUPPORT[130:130] 0x01 Reserved[129:128] 0 VENDOR_SPECIFIC_FIELD[127:67 ] 538968064ERROR_CODE [ 66:65 ] 0 ERROR_TYPE[ 64:64 ] 0x00 NATIVE_SECTOR_SIZE [ 63:63 ] 0x00 USE_NATIVE_SECTOR [ 62:62 ] 0x00 DATA_SECTOR_SIZE [ 61:61 ] 0x00 INI_TIMEOUT_EMU[ 60:60 ] 0x00C - 5FieldByte Value CLASS_6_CTRL [ 59:59 ] 0x00 DYNCAP_NEEDED[ 58:58 ] 0x00 EXCEPTION_EVENTS_CTRL [ 57:56 ] 0 EXCEPTION_EVENTS_STATUS [ 55:54 ] 0 EXT_PARTITIONS_ATTRIBUTE[ 53:52 ] 0 CONTEXT_CONF[ 51:37 ] 0 PACKED_COMMAND_STATUS [ 36:36 ] 0x00 PACKED_FAILURE_INDEX [ 35:35 ] 0x00 POWER_OFF_NOTIFICATION[ 34:34 ] 0x00 CACHE_CTRL [ 33:33 ] 0x00 FLUSH_CACHE [ 32:32 ] 0x00 BARRIER_CTRL [ 31:31 ] 0x00 MODE_CONFIG[ 30:30 ] 0x00 MODE_OPERATION_CODES[ 29:29 ] 0x00 Reserved [ 28:27 ] 0 FFU_STATUS[ 26:26 ] 0x00 PRE_LOADING_DATA_SIZE [ 25:22 ] 0MAX_PRE_LOADING_DATA_SIZE[ 21:18 ] 3304106(16G) 6608213(32G) 13216426(64G)PRODUCT_STATE_AWARENESS_ENABLEMENT[ 17:17 ] 0x01 SECURE_REMOVAL_TYPE[ 16:16 ] 0x01 CMDQ_MODE_EN[ 15:15 ] 0x00 Reserved[ 14:0 ]。

计算机类学术会议和影响因子

计算机类学术会议和影响因子

计算机类学术期刊和会议影响因子Estimated impact of publication venues in Computer Science (higher is better)1. OSDI: 3.31 (top 0.08%)2. USENIX Symposium on Internet Technologies and Systems:3.23 (top 0.16%)3. PLDI: 2.89 (top 0.24%)4. SIGCOMM: 2.79 (top 0.32%)5. MOBICOM: 2.76 (top 0.40%)6. ASPLOS: 2.70 (top 0.49%)7. USENIX Annual Technical Conference: 2.64 (top 0.57%)8. TOCS: 2.56 (top 0.65%)9. SIGGRAPH: 2.53 (top 0.73%)10. JAIR: 2.45 (top 0.81%)11. SOSP: 2.41 (top 0.90%)12. MICRO: 2.31 (top 0.98%)13. POPL: 2.26 (top 1.06%)14. PPOPP: 2.22 (top 1.14%)15. Machine Learning: 2.20 (top 1.22%)16. 25 Years ISCA: Retrospectives and Reprints: 2.19 (top 1.31%)17. WWW8 / Computer Networks: 2.17 (top 1.39%)18. Computational Linguistics: 2.16 (top 1.47%)19. JSSPP: 2.15 (top 1.55%)20. VVS: 2.14 (top 1.63%)21. FPCA: 2.12 (top 1.71%)22. LISP and Functional Programming: 2.12 (top 1.80%)23. ICML: 2.12 (top 1.88%)24. Data Mining and Knowledge Discovery: 2.08 (top 1.96%)25. SI3D: 2.06 (top 2.04%)26. ICSE - Future of SE Track: 2.05 (top 2.12%)27. IEEE/ACM Transactions on Networking: 2.05 (top 2.21%)28. OOPSLA/ECOOP: 2.05 (top 2.29%)29. WWW9 / Computer Networks: 2.02 (top 2.37%)30. Workshop on Workstation Operating Systems: 2.01 (top 2.45%)31. Journal of Computer Security: 2.00 (top 2.53%)32. TOSEM: 1.99 (top 2.62%)33. Workshop on Parallel and Distributed Debugging: 1.99 (top 2.70%)34. Workshop on Hot Topics in Operating Systems: 1.99 (top 2.78%)35. WebDB (Informal Proceedings): 1.99 (top 2.86%)36. WWW5 / Computer Networks: 1.97 (top 2.94%)37. Journal of Cryptology: 1.97 (top 3.03%)38. CSFW: 1.96 (top 3.11%)39. ECOOP: 1.95 (top 3.19%)40. Evolutionary Computation: 1.94 (top 3.27%)41. TOPLAS: 1.92 (top 3.35%)42. SIGSOFT FSE: 1.88 (top 3.43%)43. CA V: 1.88 (top 3.52%)44. AAAI/IAAI, Vol. 1: 1.87 (top 3.60%)45. PODS: 1.86 (top 3.68%)46. Artificial Intelligence: 1.85 (top 3.76%)47. NOSSDA V: 1.85 (top 3.84%)48. OOPSLA: 1.84 (top 3.93%)49. ACM Conference on Computer and Communications Security: 1.82 (top 4.01%)50. IJCAI (1): 1.82 (top 4.09%)51. VLDB Journal: 1.81 (top 4.17%)52. TODS: 1.81 (top 4.25%)53. USENIX Winter: 1.80 (top 4.34%)54. HPCA: 1.79 (top 4.42%)55. LICS: 1.79 (top 4.50%)56. JLP: 1.78 (top 4.58%)57. WWW6 / Computer Networks: 1.78 (top 4.66%)58. ICCV: 1.78 (top 4.75%)59. IEEE Real-Time Systems Symposium: 1.78 (top 4.83%)60. AES Candidate Conference: 1.77 (top 4.91%)61. KR: 1.76 (top 4.99%)62. TISSEC: 1.76 (top 5.07%)63. ACM Conference on Electronic Commerce: 1.75 (top 5.15%)64. TOIS: 1.75 (top 5.24%)65. PEPM: 1.74 (top 5.32%)66. SIGMOD Conference: 1.74 (top 5.40%)67. Formal Methods in System Design: 1.74 (top 5.48%)68. Mobile Agents: 1.73 (top 5.56%)69. REX Workshop: 1.73 (top 5.65%)70. NMR: 1.73 (top 5.73%)71. Computing Systems: 1.72 (top 5.81%)72. LOPLAS: 1.72 (top 5.89%)73. STOC: 1.69 (top 5.97%)74. Distributed Computing: 1.69 (top 6.06%)75. KDD: 1.68 (top 6.14%)76. Symposium on Testing, Analysis, and Verification: 1.65 (top 6.22%)77. Software Development Environments (SDE): 1.64 (top 6.30%)78. SIAM J. Comput.: 1.64 (top 6.38%)79. CRYPTO: 1.63 (top 6.47%)80. Multimedia Systems: 1.62 (top 6.55%)81. ICFP: 1.62 (top 6.63%)82. Lisp and Symbolic Computation: 1.61 (top 6.71%)83. ECP: 1.61 (top 6.79%)84. CHI: 1.61 (top 6.87%)86. ACM Symposium on User Interface Software and Technology: 1.59 (top 7.04%)87. ESOP: 1.58 (top 7.12%)88. ECCV: 1.58 (top 7.20%)89. ACM Transactions on Graphics: 1.57 (top 7.28%)90. CSCW: 1.57 (top 7.37%)91. AOSE: 1.57 (top 7.45%)92. ICCL: 1.57 (top 7.53%)93. Journal of Functional Programming: 1.57 (top 7.61%)94. RTSS: 1.57 (top 7.69%)95. ECSCW: 1.56 (top 7.78%)96. TOCHI: 1.56 (top 7.86%)97. ISCA: 1.56 (top 7.94%)98. SIGMETRICS/Performance: 1.56 (top 8.02%)99. IWMM: 1.55 (top 8.10%)100. JICSLP: 1.54 (top 8.19%)101. Automatic Verification Methods for Finite State Systems: 1.54 (top 8.27%)102. WWW: 1.54 (top 8.35%)103. IEEE Transactions on Pattern Analysis and Machine Intelligence: 1.54 (top 8.43%) 104. AIPS: 1.53 (top 8.51%)105. IEEE Transactions on Visualization and Computer Graphics: 1.53 (top 8.59%) 106. VLDB: 1.52 (top 8.68%)107. Symposium on Computational Geometry: 1.51 (top 8.76%)108. FOCS: 1.51 (top 8.84%)109. A TAL: 1.51 (top 8.92%)110. SODA: 1.51 (top 9.00%)111. PPCP: 1.50 (top 9.09%)112. AAAI: 1.49 (top 9.17%)113. COLT: 1.49 (top 9.25%)114. USENIX Summer: 1.49 (top 9.33%)115. Information and Computation: 1.48 (top 9.41%)116. Java Grande: 1.47 (top 9.50%)117. ISMM: 1.47 (top 9.58%)118. ICLP/SLP: 1.47 (top 9.66%)119. SLP: 1.45 (top 9.74%)120. Structure in Complexity Theory Conference: 1.45 (top 9.82%)121. IEEE Transactions on Multimedia: 1.45 (top 9.90%)122. Rules in Database Systems: 1.44 (top 9.99%)123. ACL: 1.44 (top 10.07%)124. CONCUR: 1.44 (top 10.15%)125. SPAA: 1.44 (top 10.23%)126. J. Algorithms: 1.42 (top 10.31%)127. DOOD: 1.42 (top 10.40%)128. ESEC / SIGSOFT FSE: 1.41 (top 10.48%)130. Advances in Petri Nets: 1.41 (top 10.64%)131. ICNP: 1.40 (top 10.72%)132. SSD: 1.39 (top 10.81%)133. INFOCOM: 1.39 (top 10.89%)134. IEEE Symposium on Security and Privacy: 1.39 (top 10.97%)135. Cognitive Science: 1.38 (top 11.05%)136. TSE: 1.38 (top 11.13%)137. Storage and Retrieval for Image and Video Databases (SPIE): 1.38 (top 11.22%) 138. NACLP: 1.38 (top 11.30%)139. SIGMETRICS: 1.38 (top 11.38%)140. JACM: 1.37 (top 11.46%)141. PODC: 1.37 (top 11.54%)142. International Conference on Supercomputing: 1.36 (top 11.62%)143. Fast Software Encryption: 1.35 (top 11.71%)144. IEEE Visualization: 1.35 (top 11.79%)145. SAS: 1.35 (top 11.87%)146. TACS: 1.35 (top 11.95%)147. International Journal of Computer Vision: 1.33 (top 12.03%)148. JCSS: 1.32 (top 12.12%)149. Algorithmica: 1.31 (top 12.20%)150. TOCL: 1.30 (top 12.28%)151. Information Hiding: 1.30 (top 12.36%)152. Journal of Automated Reasoning: 1.30 (top 12.44%)153. ECCV (1): 1.29 (top 12.53%)154. PCRCW: 1.29 (top 12.61%)155. Journal of Logic and Computation: 1.29 (top 12.69%)156. KDD Workshop: 1.28 (top 12.77%)157. ML: 1.28 (top 12.85%)158. ISSTA: 1.28 (top 12.94%)159. EUROCRYPT: 1.27 (top 13.02%)160. PDIS: 1.27 (top 13.10%)161. Hypertext: 1.27 (top 13.18%)162. IWDOM: 1.27 (top 13.26%)163. PARLE (2): 1.26 (top 13.34%)164. Hybrid Systems: 1.26 (top 13.43%)165. American Journal of Computational Linguistics: 1.26 (top 13.51%)166. SPIN: 1.25 (top 13.59%)167. ICDE: 1.25 (top 13.67%)168. FMCAD: 1.25 (top 13.75%)169. SC: 1.25 (top 13.84%)170. EDBT: 1.25 (top 13.92%)171. Computational Complexity: 1.25 (top 14.00%)172. International Journal of Computatinal Geometry and Applications: 1.25 (top 14.08%)174. IJCAI (2): 1.24 (top 14.25%)175. TACAS: 1.24 (top 14.33%)176. Ubicomp: 1.24 (top 14.41%)177. MPC: 1.24 (top 14.49%)178. AWOC: 1.24 (top 14.57%)179. TLCA: 1.23 (top 14.66%)180. Emergent Neural Computational Architectures Based on Neuroscience: 1.23 (top 14.74%) 181. CADE: 1.22 (top 14.82%)182. PROCOMET: 1.22 (top 14.90%)183. ACM Multimedia: 1.22 (top 14.98%)184. IEEE Journal on Selected Areas in Communications: 1.22 (top 15.06%)185. Science of Computer Programming: 1.22 (top 15.15%)186. LCPC: 1.22 (top 15.23%)187. CT-RSA: 1.22 (top 15.31%)188. ICLP: 1.21 (top 15.39%)189. Financial Cryptography: 1.21 (top 15.47%)190. DBPL: 1.21 (top 15.56%)191. AAAI/IAAI: 1.20 (top 15.64%)192. Artificial Life: 1.20 (top 15.72%)193. Higher-Order and Symbolic Computation: 1.19 (top 15.80%)194. TKDE: 1.19 (top 15.88%)195. ACM Computing Surveys: 1.19 (top 15.97%)196. Computational Geometry: 1.18 (top 16.05%)197. Autonomous Agents and Multi-Agent Systems: 1.18 (top 16.13%)198. EWSL: 1.18 (top 16.21%)199. Learning for Natural Language Processing: 1.18 (top 16.29%)200. TAPOS: 1.17 (top 16.38%)201. TAPSOFT, Vol.1: 1.17 (top 16.46%)202. International Journal of Computational Geometry and Applications: 1.17 (top 16.54%) 203. TAPSOFT: 1.17 (top 16.62%)204. IEEE Transactions on Parallel and Distributed Systems: 1.17 (top 16.70%)205. Heterogeneous Computing Workshop: 1.16 (top 16.78%)206. Distributed and Parallel Databases: 1.16 (top 16.87%)207. DAC: 1.16 (top 16.95%)208. ICTL: 1.16 (top 17.03%)209. Performance/SIGMETRICS Tutorials: 1.16 (top 17.11%)210. IEEE Computer: 1.15 (top 17.19%)211. IEEE Real Time Technology and Applications Symposium: 1.15 (top 17.28%)212. TAPSOFT, Vol.2: 1.15 (top 17.36%)213. ACM Workshop on Role-Based Access Control: 1.15 (top 17.44%)214. WCRE: 1.14 (top 17.52%)215. Applications and Theory of Petri Nets: 1.14 (top 17.60%)216. ACM SIGOPS European Workshop: 1.14 (top 17.69%)218. Mathematical Structures in Computer Science: 1.14 (top 17.85%)219. Workshop on the Management of Replicated Data: 1.13 (top 17.93%)220. ECCV (2): 1.13 (top 18.01%)221. PPSN: 1.13 (top 18.09%)222. Middleware: 1.13 (top 18.18%)223. OODBS: 1.12 (top 18.26%)224. Electronic Colloquium on Computational Complexity (ECCC): 1.12 (top 18.34%) 225. UML: 1.12 (top 18.42%)226. Real-Time Systems: 1.12 (top 18.50%)227. FME: 1.12 (top 18.59%)228. Evolutionary Computing, AISB Workshop: 1.11 (top 18.67%)229. IEEE Conference on Computational Complexity: 1.11 (top 18.75%)230. IOPADS: 1.11 (top 18.83%)231. IJCAI: 1.10 (top 18.91%)232. ISWC: 1.10 (top 19.00%)233. SIGIR: 1.10 (top 19.08%)234. Symposium on LISP and Functional Programming: 1.10 (top 19.16%)235. PASTE: 1.10 (top 19.24%)236. HPDC: 1.10 (top 19.32%)237. Application and Theory of Petri Nets: 1.09 (top 19.41%)238. ICCAD: 1.09 (top 19.49%)239. Category Theory and Computer Science: 1.08 (top 19.57%)240. Recent Advances in Intrusion Detection: 1.08 (top 19.65%)241. JIIS: 1.08 (top 19.73%)242. TODAES: 1.08 (top 19.81%)243. Neural Computation: 1.08 (top 19.90%)244. CCL: 1.08 (top 19.98%)245. SIGPLAN Workshop: 1.08 (top 20.06%)246. DPDS: 1.07 (top 20.14%)247. ACM Multimedia (1): 1.07 (top 20.22%)248. MAAMAW: 1.07 (top 20.31%)249. Computer Graphics Forum: 1.07 (top 20.39%)250. HUG: 1.06 (top 20.47%)251. Hybrid Neural Systems: 1.06 (top 20.55%)252. SRDS: 1.06 (top 20.63%)253. TPCD: 1.06 (top 20.72%)254. ILP: 1.06 (top 20.80%)255. ARTDB: 1.06 (top 20.88%)256. NIPS: 1.06 (top 20.96%)257. Formal Aspects of Computing: 1.06 (top 21.04%)258. ECHT: 1.06 (top 21.13%)259. ICMCS: 1.06 (top 21.21%)260. Wireless Networks: 1.05 (top 21.29%)261. Advances in Data Base Theory: 1.05 (top 21.37%)262. WDAG: 1.05 (top 21.45%)263. ALP: 1.05 (top 21.53%)264. TARK: 1.05 (top 21.62%)265. PATAT: 1.05 (top 21.70%)266. ISTCS: 1.04 (top 21.78%)267. Concurrency - Practice and Experience: 1.04 (top 21.86%)268. CP: 1.04 (top 21.94%)269. Computer Vision, Graphics, and Image Processing: 1.04 (top 22.03%) 270. FTCS: 1.04 (top 22.11%)271. RTA: 1.04 (top 22.19%)272. COORDINATION: 1.03 (top 22.27%)273. CHDL: 1.03 (top 22.35%)274. Theory of Computing Systems: 1.02 (top 22.44%)275. CTRS: 1.02 (top 22.52%)276. COMPASS/ADT: 1.02 (top 22.60%)277. TOMACS: 1.02 (top 22.68%)278. IEEE Micro: 1.02 (top 22.76%)279. IEEE PACT: 1.02 (top 22.85%)280. ASIACRYPT: 1.01 (top 22.93%)281. MONET: 1.01 (top 23.01%)282. WWW7 / Computer Networks: 1.01 (top 23.09%)283. HUC: 1.01 (top 23.17%)284. Expert Database Conf.: 1.00 (top 23.25%)285. Agents: 1.00 (top 23.34%)286. CPM: 1.00 (top 23.42%)287. SIGPLAN Symposium on Compiler Construction: 1.00 (top 23.50%) 288. International Conference on Evolutionary Computation: 1.00 (top 23.58%) 289. TAGT: 1.00 (top 23.66%)290. Workshop on Parallel and Distributed Simulation: 1.00 (top 23.75%) 291. FTRTFT: 1.00 (top 23.83%)292. TPHOLs: 1.00 (top 23.91%)293. Intelligent User Interfaces: 0.99 (top 23.99%)294. Journal of Functional and Logic Programming: 0.99 (top 24.07%)295. Cluster Computing: 0.99 (top 24.16%)296. ESA: 0.99 (top 24.24%)297. PLILP: 0.99 (top 24.32%)298. COLING-ACL: 0.98 (top 24.40%)299. META: 0.97 (top 24.48%)300. IEEE MultiMedia: 0.97 (top 24.57%)301. ICALP: 0.97 (top 24.65%)302. IATA: 0.97 (top 24.73%)303. FPGA: 0.97 (top 24.81%)304. EuroCOLT: 0.97 (top 24.89%)305. New Generation Computing: 0.97 (top 24.97%)306. Automated Software Engineering: 0.97 (top 25.06%)307. GRID: 0.97 (top 25.14%)308. ISOTAS: 0.96 (top 25.22%)309. LPNMR: 0.96 (top 25.30%)310. PLILP/ALP: 0.96 (top 25.38%)311. UIST: 0.96 (top 25.47%)312. IPCO: 0.95 (top 25.55%)313. ICPP, Vol. 1: 0.95 (top 25.63%)314. PNPM: 0.95 (top 25.71%)315. HSCC: 0.95 (top 25.79%)316. ILPS: 0.95 (top 25.88%)317. RIDE-IMS: 0.95 (top 25.96%)318. Int. J. on Digital Libraries: 0.95 (top 26.04%)319. STTT: 0.94 (top 26.12%)320. MFPS: 0.94 (top 26.20%)321. Graph-Grammars and Their Application to Computer Science: 0.93 (top 26.28%) 322. Graph Drawing: 0.93 (top 26.37%)323. VRML: 0.93 (top 26.45%)324. VDM Europe: 0.93 (top 26.53%)325. AAAI/IAAI, V ol. 2: 0.93 (top 26.61%)326. Z User Workshop: 0.93 (top 26.69%)327. Constraints: 0.93 (top 26.78%)328. SCM: 0.93 (top 26.86%)329. IEEE Software: 0.92 (top 26.94%)330. World Wide Web: 0.92 (top 27.02%)331. HOA: 0.92 (top 27.10%)332. Symposium on Reliable Distributed Systems: 0.92 (top 27.19%)333. SIAM Journal on Discrete Mathematics: 0.92 (top 27.27%)334. SMILE: 0.91 (top 27.35%)335. HART: 0.91 (top 27.43%)336. ICPP, Vol. 3: 0.91 (top 27.51%)337. FASE: 0.91 (top 27.60%)338. TCS: 0.91 (top 27.68%)339. IEEE Transactions on Information Theory: 0.91 (top 27.76%)340. C++ Conference: 0.91 (top 27.84%)341. ICSE: 0.90 (top 27.92%)342. ARTS: 0.90 (top 28.00%)343. Journal of Computational Biology: 0.90 (top 28.09%)344. SIGART Bulletin: 0.90 (top 28.17%)345. TREC: 0.89 (top 28.25%)346. Implementation of Functional Languages: 0.89 (top 28.33%)347. Acta Informatica: 0.88 (top 28.41%)348. SAIG: 0.88 (top 28.50%)349. CANPC: 0.88 (top 28.58%)350. CACM: 0.87 (top 28.66%)351. PADL: 0.87 (top 28.74%)352. Networked Group Communication: 0.87 (top 28.82%)353. RECOMB: 0.87 (top 28.91%)354. ACM DL: 0.87 (top 28.99%)355. Computer Performance Evaluation: 0.87 (top 29.07%)356. Journal of Parallel and Distributed Computing: 0.86 (top 29.15%)357. PARLE (1): 0.86 (top 29.23%)358. DISC: 0.85 (top 29.32%)359. FGCS: 0.85 (top 29.40%)360. ELP: 0.85 (top 29.48%)361. IEEE Transactions on Computers: 0.85 (top 29.56%)362. JSC: 0.85 (top 29.64%)363. LOPSTR: 0.85 (top 29.72%)364. FoSSaCS: 0.85 (top 29.81%)365. World Congress on Formal Methods: 0.85 (top 29.89%)366. CHARME: 0.84 (top 29.97%)367. RIDE: 0.84 (top 30.05%)368. APPROX: 0.84 (top 30.13%)369. EWCBR: 0.84 (top 30.22%)370. CC: 0.83 (top 30.30%)371. Public Key Cryptography: 0.83 (top 30.38%)372. CA: 0.83 (top 30.46%)373. CHES: 0.83 (top 30.54%)374. ECML: 0.83 (top 30.63%)375. LCTES/OM: 0.83 (top 30.71%)376. Information Systems: 0.83 (top 30.79%)377. IJCIS: 0.83 (top 30.87%)378. Journal of Visual Languages and Computing: 0.82 (top 30.95%)379. WADS: 0.82 (top 31.04%)380. Random Structures and Algorithms: 0.81 (top 31.12%)381. ICS: 0.81 (top 31.20%)382. Data Engineering Bulletin: 0.81 (top 31.28%)383. VDM Europe (1): 0.81 (top 31.36%)384. SW AT: 0.80 (top 31.44%)385. Nordic Journal of Computing: 0.80 (top 31.53%)386. Mathematical Foundations of Programming Semantics: 0.80 (top 31.61%)387. Architectures and Compilation Techniques for Fine and Medium Grain Parallelism: 0.80 (top 31.69%)388. KBSE: 0.80 (top 31.77%)389. STACS: 0.80 (top 31.85%)390. EMSOFT: 0.80 (top 31.94%)391. IEEE Data Engineering Bulletin: 0.80 (top 32.02%)392. Annals of Mathematics and Artificial Intelligence: 0.79 (top 32.10%)393. WOSP: 0.79 (top 32.18%)394. VBC: 0.79 (top 32.26%)395. RTDB: 0.79 (top 32.35%)396. CoopIS: 0.79 (top 32.43%)397. Combinatorica: 0.79 (top 32.51%)398. International Journal of Geographical Information Systems: 0.78 (top 32.59%)399. Autonomous Robots: 0.78 (top 32.67%)400. IW-MMDBMS: 0.78 (top 32.76%)401. ESEC: 0.78 (top 32.84%)402. WADT: 0.78 (top 32.92%)403. CAAP: 0.78 (top 33.00%)404. LCTES: 0.78 (top 33.08%)405. ZUM: 0.77 (top 33.16%)406. TYPES: 0.77 (top 33.25%)407. Symposium on Reliability in Distributed Software and Database Systems: 0.77 (top 33.33%) 408. TABLEAUX: 0.77 (top 33.41%)409. International Journal of Parallel Programming: 0.77 (top 33.49%)410. COST 237 Workshop: 0.77 (top 33.57%)411. Data Types and Persistence (Appin), Informal Proceedings: 0.77 (top 33.66%)412. Evolutionary Programming: 0.77 (top 33.74%)413. Reflection: 0.76 (top 33.82%)414. SIGMOD Record: 0.76 (top 33.90%)415. Security Protocols Workshop: 0.76 (top 33.98%)416. XP1 Workshop on Database Theory: 0.76 (top 34.07%)417. EDMCC: 0.76 (top 34.15%)418. DL: 0.76 (top 34.23%)419. EDAC-ETC-EUROASIC: 0.76 (top 34.31%)420. Protocols for High-Speed Networks: 0.76 (top 34.39%)421. PPDP: 0.75 (top 34.47%)422. IFIP PACT: 0.75 (top 34.56%)423. LNCS: 0.75 (top 34.64%)424. IWQoS: 0.75 (top 34.72%)425. UK Hypertext: 0.75 (top 34.80%)426. Selected Areas in Cryptography: 0.75 (top 34.88%)427. ICATPN: 0.74 (top 34.97%)428. Workshop on Computational Geometry: 0.74 (top 35.05%)429. Integrated Network Management: 0.74 (top 35.13%)430. ICGI: 0.74 (top 35.21%)431. ICPP (2): 0.74 (top 35.29%)432. SSR: 0.74 (top 35.38%)433. ADB: 0.74 (top 35.46%)434. Object Representation in Computer Vision: 0.74 (top 35.54%)435. PSTV: 0.74 (top 35.62%)436. CAiSE: 0.74 (top 35.70%)437. On Knowledge Base Management Systems (Islamorada): 0.74 (top 35.79%)438. CIKM: 0.73 (top 35.87%)439. WSA: 0.73 (top 35.95%)440. RANDOM: 0.73 (top 36.03%)441. KRDB: 0.73 (top 36.11%)442. ISSS: 0.73 (top 36.19%)443. SIGAL International Symposium on Algorithms: 0.73 (top 36.28%)444. INFORMS Journal on Computing: 0.73 (top 36.36%)445. Computer Supported Cooperative Work: 0.73 (top 36.44%)446. CSL: 0.72 (top 36.52%)447. Computational Intelligence: 0.72 (top 36.60%)448. ICCBR: 0.72 (top 36.69%)449. ICES: 0.72 (top 36.77%)450. AI Magazine: 0.72 (top 36.85%)451. JELIA: 0.72 (top 36.93%)452. VR: 0.71 (top 37.01%)453. ICPP (1): 0.71 (top 37.10%)454. RIDE-TQP: 0.71 (top 37.18%)455. ISA: 0.71 (top 37.26%)456. Data Compression Conference: 0.71 (top 37.34%)457. CIA: 0.71 (top 37.42%)458. COSIT: 0.71 (top 37.51%)459. IJCSLP: 0.71 (top 37.59%)460. DISCO: 0.71 (top 37.67%)461. DKE: 0.71 (top 37.75%)462. IWAN: 0.71 (top 37.83%)463. Operating Systems Review: 0.70 (top 37.91%)464. IEEE Internet Computing: 0.70 (top 38.00%)465. LISP Conference: 0.70 (top 38.08%)466. C++ Workshop: 0.70 (top 38.16%)467. SPDP: 0.70 (top 38.24%)468. Fuji International Symposium on Functional and Logic Programming: 0.69 (top 38.32%) 469. LPAR: 0.69 (top 38.41%)470. ECAI: 0.69 (top 38.49%)471. Hypermedia: 0.69 (top 38.57%)472. Artificial Intelligence in Medicine: 0.69 (top 38.65%)473. AADEBUG: 0.69 (top 38.73%)474. VL: 0.69 (top 38.82%)475. FSTTCS: 0.69 (top 38.90%)476. AMAST: 0.68 (top 38.98%)477. Artificial Intelligence Review: 0.68 (top 39.06%)478. HPN: 0.68 (top 39.14%)479. POS: 0.68 (top 39.23%)480. Research Directions in High-Level Parallel Programming Languages: 0.68 (top 39.31%) 481. Performance Evaluation: 0.68 (top 39.39%)482. ASE: 0.68 (top 39.47%)483. LFCS: 0.67 (top 39.55%)484. ISCOPE: 0.67 (top 39.63%)485. Workshop on Software and Performance: 0.67 (top 39.72%)486. European Workshop on Applications and Theory in Petri Nets: 0.67 (top 39.80%) 487. ICPP: 0.67 (top 39.88%)488. INFOVIS: 0.67 (top 39.96%)489. Description Logics: 0.67 (top 40.04%)490. JCDKB: 0.67 (top 40.13%)491. Euro-Par, Vol. I: 0.67 (top 40.21%)492. RoboCup: 0.67 (top 40.29%)493. Symposium on Solid Modeling and Applications: 0.66 (top 40.37%)494. TPLP: 0.66 (top 40.45%)495. CVRMed: 0.66 (top 40.54%)496. POS/PJW: 0.66 (top 40.62%)497. FORTE: 0.66 (top 40.70%)498. IPMI: 0.66 (top 40.78%)499. ADL: 0.66 (top 40.86%)。

MultimediaSystem

MultimediaSystem

© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-1A Multimedia Course onMultimedia Technology Multimedia TechnologyA Graduate CourseWinter Semester 2001/2002Prof. Dr. Wolfgang EffelsbergUniversity of MannheimProf. Dr. Ralf SteinmetzDarmstadt University of Technology© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction1-2A Multimedia Course on Multimedia Technology Table of Content (1)1.Introduction1.1What is a multimedia system?1.2Fundamentals and terminologypression Algorithms for Multimedia 2.1Fundamentals of data compression2.2Compression algorithms for still images 2.3Compression algorithms for video2.4Compression with wavelets2.5Audio compression3.Multimedia Communication3.1Network technology, as it is today3.2Quality of Service3.3Multicast3.4Media scaling and media filtering3.5New algorithms and protocols formultimedia streams on the Internet© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction1-3A Multimedia Course on Multimedia Technology Table of Content(2)4.Automatic Content Analysis of Audioand Video4.1Basic parameters for video analysis4.2Deriving semantics for the video track4.3Basic parameters for audio analysis4.4Deriving semantics for the audio track4.5Application examples5.Operating System Support for Multimedia 5.1Real-Time capability5.2Scheduling algorithms5.3Device management6.Storage of Multimedia Data Streams6.1Optical disk storage6.2Video file systems6.3Video server© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction1-4A Multimedia Course on Multimedia Technology Table of Content(3)er Interfaces7.1Motivation for new user interfaces formultimedia systems7.2Gesture recognition7.3Speech recognition7.4Integration of multimedia computers intothe environment (ubiquitous computing)7.5Smart clothes8.Digital Watermarking8.1Security in multimedia systems8.2Watermarks: History, types and applications 8.3Robust watermarks for images and audio 8.4Open problems8.5Fragile watermarks: Protecting the integrityof documents© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-5A Multimedia Course onMultimedia Technology Recommended Reading (1)Ordered by relevance for this course)1.R. Steinmetz: Multimedia-Technologie –Grundlagen,Komponenten und Systeme.2.Auflage, Springer Verlag, Heidelberg, Berlin,New York, 1998(English version of the second edition to appear soon)2.F.Kuo, W. Effelsberg, J.J. Garcia-Luna-Aceves: Multimedia Communications –Protocols and Appli-cations. Prentice Hall, Upper Saddle River, 19983.W. Effelsberg, R. Steinmetz: Video Compression Techniques.dpunkt.Verlag, Heidelberg, 19984.K.Froitzheim: Multimedia-Kommunikation.dpunkt.Verlag, Heidelberg, 1997(in German)5.W. B.Pennebaker, J. L. Mitchell: JPEG Still Image Compression Standard. Van Nostrand Reinhold, New York, 19936.J. L. Mitchell, W. B.Pennebaker, Ch. E.Fogg, D. J.LeGall: MPEG Video Compression Standard.Chapman&Hall, New York, 19967.Michael F.Barnsley, Lyman P.Hurd:Bildkompression mit Fraktalen.Vieweg-Verlag,Wiesbaden, 1996© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-6A Multimedia Course onMultimedia Technology Recommended Reading (2)8. All issues of the "IEEE Multimedia Magazine"9. All issues of the "Multimedia Systems Journal …(ACM /Springer-Verlag)10. All issues of the journal "Multimedia Tools and Applications" (Kluwer Academic Publishers)© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction1-7A Multimedia Course on Multimedia Technology AcknowledgementWe would like to thank our colleagues Lars Wolf, Carsten Vogt, Jörg Liebeherr and Jana Dittmann for allowing us to use some of their transparencies in this course. Their support is gratefully acknowledged.© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-8A Multimedia Course onMultimedia Technology 1. Introduction1.1. What is a multimedia system?A multimedia system supports the integrated storage, transmission and representation of the discrete media types text, graphics and image and the continuous media types audio and video on a digital computer.© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-9A Multimedia Course onMultimedia Technology A Hybrid (analog/digital) Multimedia System Early multimedia system, around 1985Computers control the analog media streams, e.g., via cross-connect switches.digitalThe Eighties:Analog solutions© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-10A Multimedia Course onMultimedia Technology Digital Multimedia SystemThe media streams are digital. They can be processed (e.g., compressed/decompressed, analyzed) in the computer.© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-11A Multimedia Course onMultimedia Technology Time-Independent and Time-Dependent Media Time-Independent Media•Information is not related to timing of the data stream •All …classic “ media in the computer, such as:•text•graphics (line drawings, vector graphic)•image (photo, pixel graphics).Time-Dependent Media•Information is time-related, must be shown to the user at specific points in time•Continuous data streams•Data appears in regular intervals•Examples:•Audio (continuous)•Video (continuous)•An animation (not a continuous stream, but time-dependent)•An interactive game on the Internet (not acontinuous stream, but has real-timerequirements)© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-12A Multimedia Course onMultimedia Technology Our Definition of MultimediaA multimedia system is characterized by the •integrated-production,-processing,-storage,-representation,-and transmission•of several time-dependent and time-independent media streams.© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-13A Multimedia Course onMultimedia Technology History of Bandwidth in Computer Networks Bandwidth of perception at the m an-m achine interface19501960197019801990+card reader Text teletype C RT term inalG raphics bitm ap displays Audio M otion Video signal processor ,Text Text pointing devices optical disc,fiber text text text text© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-14A Multimedia Course onMultimedia Technology Network Requirements ofDifferent Types of Data Streamshigh B and w idth m ail audio (teleph.)videoLoss rate m ail audio (teleph.)videover y lowlowm oderate fast D elay m ailaudio (teleph.)video slow© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction 1-15A Multimedia Course onMultimedia Technology Goals of CompressionThe compression of multimedia data streams saves•storage space•transmission bandwidth.high qualityC om pression lo w dela ylo w com ple xity efficient im plem entation© Wolfgang Effelsberg, Ralf Steinmetz 1. Introduction1-16A Multimedia Course onMultimedia TechnologyArchitecture of a Multimedia Workstation。

SP800-12_计算机安全介绍2:NIST手册(v1.00)

SP800-12_计算机安全介绍2:NIST手册(v1.00)

第九章
保证
9.1 审批和保证 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 9.2 计划和保证 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 9.3 设计和实施的保证 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 9.4 操作的保证 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 9.5 相互关系 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 9.6 费用考虑 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
会)制定。ቤተ መጻሕፍቲ ባይዱ48 系统是指处理的整体集合,既包括人工执行部分也包括使用计算机的部分(如人工的数
据采集以及随后的计算机处理),也就是功能部分。这既包括应用系统和包括支持系统,如

职称职务头衔名称的英文翻译

职称职务头衔名称的英文翻译

职称职务头衔名称的英文翻译1. Chief Executive Officer (CEO) 首席执行官2. Managing Director (MD) 总经理3. Chief Operating Officer (COO) 首席运营官4. Chief Financial Officer (CFO) 首席财务官5. Chief Information Officer (CIO) 首席信息官6. Chief Marketing Officer (CMO) 首席营销官7. Chief Technology Officer (CTO) 首席技术官8. Vice President (VP) 副总裁9. Director of Operations 运营总监10. Director of Marketing 市场总监11. Director of Finance 财务总监12. Director of Human Resources 人力资源总监13. Director of Sales 销售总监14. Project Manager 项目经理15. Senior Manager 高级经理16. General Manager (GM) 总经理17. Operations Manager 运营经理18. Marketing Manager 市场经理19. Finance Manager 财务经理20. Human Resources Manager 人力资源经理21. Sales Manager 销售经理22. Account Manager 客户经理23. Business Development Manager 业务发展经理24. Product Manager 产品经理25. Purchasing Manager 采购经理26. Supply Chain Manager 供应链经理27. Public Relations Manager 公关经理28. Brand Manager 品牌经理29. Communications Manager 通讯经理30. Social Media Manager 社交媒体经理31. Content Manager 内容经理32. Web Developer 网站开发人员33. Software Engineer 软件工程师34. Database Administrator 数据库管理员35. Network Administrator 网络管理员36. Information Security Analyst 信息安全分析师37. Data Scientist 数据科学家38. IT Manager IT经理39. Customer Service Representative 客服代表40. Sales Representative 销售代表41. Account Executive 客户主管42. Business Analyst 业务分析师43. Financial Analyst 财务分析师44. Market Research Analyst 市场研究分析师45. Public Accountant 注册会计师46. Human Resources Coordinator 人力资源协调员47. Recruiter 招聘专员48. Administrative Assistant 行政助理49. Executive Assistant 行政助理50. Receptionist 接待员51. Office Manager 办公室经理52. Operations Coordinator 运营协调员53. Marketing Coordinator 市场协调员54. Financial Coordinator 财务协调员55. Sales Coordinator 销售协调员56. Project Coordinator 项目协调员57. Quality Control Manager 质量控制经理58. Safety Manager 安全经理59. Environmental Manager 环境经理60. Compliance Manager 合规经理61. Legal Counsel 律师62. Regulatory Affairs Manager 法规事务经理63. Government Relations Manager 政府关系经理64. Lobbyist 游说者65. Public Affairs Manager 公共事务经理66. Event Planner 活动策划师67. Travel Coordinator 行程协调员68. Education Coordinator 教育协调员69. Communications Coordinator 通讯协调员70. Social Media Coordinator 社交媒体协调员71. Public Relations Coordinator 公共关系协调员72. Brand Coordinator 品牌协调员73. Content Coordinator 内容协调员74. Customer Service Manager 客服经理75. Sales Trainer 销售培训师76. Learning and Development Manager 学习和发展经理77. Performance Management Manager 绩效管理经理78. Compensation and Benefits Manager 薪资和福利经理79. Talent Acquisition Manager 人才招聘经理80. Human Resources Information Systems (HRIS) Manager 人力资源信息系统经理81. Diversity and Inclusion Manager 多元化和包容性经理82. Health and Wellness Manager 健康与福利经理83. Sports Marketing Manager 运动营销经理84. Talent Agent 艺人经纪人85. Studio Executive 制片商高层86. Production Assistant 制片助理87. Film Director 电影导演88. Screenwriter 编剧89. Cinematographer 摄影师90. Film Editor 影片编辑91. Set Designer 布景设计师92. Sound Designer 音效设计师93. Composer 作曲家94. Musician 音乐家95. Record Producer 音乐制作人96. Recording Engineer 音乐录制工程师97. Radio Host 电台主持人98. Television Producer 电视制片人99. Broadcast Engineer 广播工程师100. Advertising Account Executive 广告客户主管101. Creative Director 创意总监102. Art Director 美术指导103. Copywriter 文案撰稿人104. Media Planner 媒体策划师105. Market Research Manager 市场研究经理106. Public Relations Specialist 公共关系专家107. Brand Strategist 品牌策略师108. Marketing Analyst 市场分析师109. Digital Marketing Specialist 数字营销专员110. Content Strategist 内容策略师111. Social Media Specialist 社交媒体专员112. Graphic Designer 平面设计师113. Web Designer 网页设计师114. Multimedia Designer 多媒体设计师115. Animator 动画师116. Game Designer 游戏设计师117. User Experience (UX) Designer 用户体验设计师118. User Interface (UI) Designer 用户界面设计师119. Information Architect 信息架构师120. Interaction Designer 互动设计师121. Mobile Developer 移动应用开发人员122. Web Developer 网站开发人员123. Software Developer 软件开发人员124. Database Developer 数据库开发人员125. Front-End Developer 前端开发人员126. Back-End Developer 后端开发人员127. Full-Stack Developer 全栈开发人员128. Quality Assurance (QA) Engineer 质量控制工程师129. Test Engineer 测试工程师130. Systems Administrator 系统管理员131. Network Engineer 网络工程师132. Technical Support Engineer 技术支持工程师133. Help Desk Technician 帮助台技术人员134. Cybersecurity Analyst 网络安全分析师135. Penetration Tester 渗透测试人员136. Malware Analyst 恶意软件分析师137. Information Security Consultant 信息安全顾问138. IT Auditor IT审计员139. Computer Forensic Analyst 计算机取证分析师140. Network Security Engineer 网络安全工程师141. Cloud Architect 云架构师142. Cloud Engineer 云工程师143. Cloud Administrator 云管理员144. DevOps Engineer DevOps工程师145. Agile Coach 敏捷教练146. Scrum Master Scrum主管147. Product Owner 产品负责人148. Agile Project Manager 敏捷项目经理149. Business Process Analyst 业务流程分析师150. Business Process Manager 业务流程经理151. Lean Six Sigma Black Belt 质量管理师152. Business Transformation Manager 业务转型经理153. Change Management Specialist 变革管理专家154. Continuous Improvement Manager 持续改进经理155. Enterprise Architect 企业架构师156. Solution Architect 解决方案架构师157. Technical Architect 技术架构师158. Infrastructure Architect 基础架构师159. Network Architect 网络架构师160. Data Architect 数据架构师161. Data Analyst 数据分析师162. Database Administrator 数据库管理员163. Data Engineer 数据工程师164. Business Intelligence (BI) Analyst 业务智能分析师165. Data Scientist 数据科学家166. Machine Learning Engineer 机器学习工程师167. Artificial Intelligence (AI) Engineer 人工智能工程师168. Robotic Process Automation (RPA) Developer 机器人流程自动化开发人员169. Virtual Reality (VR) Developer 虚拟现实开发人员170. Augmented Reality (AR) Developer 增强现实开发人员171. Blockchain Developer 区块链开发人员172. Cryptocurrency Trader 加密货币交易员173. Cryptocurrency Analyst 加密货币分析师174. Data Entry Clerk 数据录入员175. File Clerk 档案员176. Office Assistant 办公室助理177. Secretary 秘书178. Paralegal 律师助理179. Legal Assistant 法律助理180. Court Reporter 法院记录员181. Translator 翻译182. Interpreter 口译员183. Tour Guide 导游184. Flight Attendant 空乘人员185. Hotel Manager 酒店经理186. Restaurant Manager 餐厅经理187. Chef 主厨188. Waiter 服务员189. Bartender 酒保190. Retail Store Manager 零售店经理191. Sales Associate 销售顾问192. Visual Merchandiser 视觉陈列师193. Supply Chain Analyst 供应链分析师194. Logistics Coordinator 物流协调员195. Warehouse Manager 仓库经理196. Distribution Manager 分销经理197. Import/Export Manager 进出口经理198. Freight Broker 货运经纪人199. Customs Broker 海关经纪人200. Transportation Manager 运输经理。

计算机英语缩写单词及全称

计算机英语缩写单词及全称

AD活动目录AL算术/逻辑部件AP应用程序接口AS专用集成电路AT异步转移(传输)模式CD光盘 激光唱盘,高密度磁盘CD码分多址CD光盘只读存储器CD只读光盘CI复杂指令系统计算机CP客户设备CP中央处理器CS载波侦听多路访问/冲突DL动态链接库DM直接存储器存取DO美国国防部DR动态随机存储器DS直序扩频DV数字视频光盘EF加密文件系统FD光纤分布式数据接口FH跳频扩频GN一个自由软件组织GP公用授权协议GU图形用户界面HP高性能计算I/输入/输出II因特网信息服务IM因特网多媒体核心网子系统IO输入输出控制系统IP进程间通信IS( Industrial ,Scientific,and Medical )band 工业、科学和医药频段IS国际标准化组织IT信息技术LA局域网MA媒体访问控制MI百万条指令(数)每秒NA网络访问保护NI多端口网桥OS开放系统互连参考模型PC个人计算机PC外围部件互连(总线)PD个人数字助理PO可移植的UNIX系统PV永久式虚电路RA随机(访问)存储器RI精简指令系统计算机RO只读存储器SI会话起始协议SP系统性能评价合作组织SV交换式虚电路TC传输控制协议/互联网协议TDUD用户数据报协议UP不间断电源US通用串行总线UT非屏蔽双绞线VP虚拟专用网WA广域网WA无线应用协议WL无线局域网WO,read many 一次写,多次写AD Active Directory 活动目录ALU arithmetic and logic unit 算术/逻辑部件API Application Program Interface 应用程序接口ASIC Application-Specific Integrated Circuit 专用集成电路ATM Asynchronous Transfer Mode 异步转移(传输)模式CD Computer Disk 光盘 激光唱盘,高密度磁盘CDMA Code Division Multiple Access 码分多址CD-ROM compact Disk Read-Only Memory 光盘只读存储器CD-ROM Compact Disk ROM 只读光盘CISC complex instruction set computer 复杂指令系统计算机CPE Customer Premises Equipment 客户设备CPU central processing unit 中央处理器CSMA/CD Carrier Sense Multiple Access / Collision Detection 载波侦听多路访问/冲突检测DLL Dynamic Link library 动态链接库DMA direct memory access 直接存储器存取DOD Department Of Defense 美国国防部DRAM Dynamic RAM 动态随机存储器DSSS Direct Sequence Spread Spectrum 直序扩频DVD Digital Video Disk 数字视频光盘EFS Encrypting File System 加密文件系统FDDI Fiber Distributed Data Interface 光纤分布式数据接口FHSS Frequency Hopping Spread Spectrum 跳频扩频GNU Gnu Not UNIX 一个自由软件组织GPL General Public License 公用授权协议GUI Graphical User Interface 图形用户界面HPC High Performance Computing 高性能计算I/O input/output 输入/输出IIS Internet Information Services 因特网信息服务IMS Internet Multimedia core network Subsystem 因特网多媒体核心网子系统IOCS input/output control system 输入输出控制系统IPC Inter-Process Communication 进程间通信ISM ( Industrial ,Scientific,and Medical )band 工业、科学和医药频段ISO International Standards Organization 国际标准化组织IT Information Technology 信息技术LAN Local Area Network 局域网MAC Medium Access Control 媒体访问控制MIPS millions of instructions executed per second 百万条指令(数)每秒NAP Network Access Protection 网络访问保护NIC Network Interface Card 多端口网桥OSI/RM Open System Interconnection / Reference Model 开放系统互连参考模型PC personal computer 个人计算机PCI Peripheral Component Interconnect 外围部件互连(总线)PDA Personal Digital Assistant 个人数字助理POSIX Portable Operating System UNIX 可移植的UNIX系统PVC Permanent Virtual Circuit 永久式虚电路RAM Random Access Memory 随机(访问)存储器RISC reduced instruction set computer 精简指令系统计算机ROM Read Only Memory 只读存储器SIP Session Initiation Protocol 会话起始协议SPEC System Performance Evaluation Cooperative 系统性能评价合作组织SVC Switched Virtual Circuit 交换式虚电路TCP/IP Transmission Control Protocol/ Internet Protocol 传输控制协议/互联网协议TDM Time Division MultiplexUDP user datagram protocol 用户数据报协议UPS Uninterruptible Power Supply 不间断电源USB Universal Serial Bus 通用串行总线UTP Unshielded Twisted Pair 非屏蔽双绞线VPN Virtual Private Network 虚拟专用网WAN Wide Area Network 广域网WAP Wireless Application Protocol 无线应用协议WLAN Wireless Local Area Network 无线局域网WORM write once,read many 一次写,多次写。

公司职位中英文对照

公司职位中英文对照

公司职位中英文对照?首席技术执行官CTO/VP Engineering技术总监/经理Technical Director/Manager信息技术经理IT Manager信息技术主管IT Supervisor信息技术专员IT Specialist项目经理/主管Project Manager/Supervisor项目执行/协调人员Project Specialist / Coordinator系统分析员System Analyst高级软件工程师Senior Software Engineer软件工程师Software Engineer系统工程师System Engineer高级硬件工程师Senior Hardware Engineer硬件工程师Hardware Engineer通信技术工程师Communications EngineerERP技术/应用顾问ERP Technical/Application Consultant 数据库工程师Database Engineer技术支持经理Technical Support Manager技术支持工程师Technical Support Engineer品质经理QA Manager信息安全工程师Information Security Engineer软件测试工程师Software QA Engineer硬件测试工程师Hardware QA Engineer测试员Test Engineer网站营运经理/主管Web Operations Manager/Supervisor 网络工程师Network Engineer系统管理员/网管System Manager/Webmaster网页设计/制作Web Designer/Production技术文员/助理Technical Clerk/Assistant销售Sales销售总监Sales Director销售经理Sales Manager区域销售经理Regional Sales Manager客户经理Sales Account Manager渠道/分销经理Channel/Distribution Manager渠道主管Channel Supervisor销售主管Sales Supervisor销售代表Sales Representative / Executive销售工程师Sales Engineer医药代表Pharmaceutical Sales Representative保险代理Insurance Agent销售助理Sales Assistant / Trainee商务经理Business Manager商务专员/助理Business Executive/Assistant销售行政经理Sales Admin. Manager销售行政主管Sales Admin. Supervisor售前/售后技术服务经理Technical Service Manager售前/售后技术服务主管Technical Service Supervisor售前/售后技术服务工程师Technical Service Engineer售后/客户服务(非技术)经理Customer Service Manager售后/客户服务(非技术)主管Customer Service Supervisor售后/客户服务(非技术)专员Customer Service Executive经销商Distributor计算机硬件Computer, Hardware高级硬件工程师Senior Hardware Engineer硬件工程师Hardware Engineer其他Others计算机软件Computer, Software高级软件工程师Senior Software Engineer软件工程师Software EngineerERP技术/开发应用ERP Application R&D/Implementation系统集成工程师System Integration Engineer系统分析员System Analyst系统工程师System Engineer数据库工程师/管理员Database Engineer/Administrator计算机辅助设计工程师Computer Aided Design Engineer其他Others互联网开发及应用Internet互联网软件开发工程师Internet/E-Commerce Software Engineer多媒体/游戏开发工程师Multimedia/Game Development Engineer 网站营运经理/主管Web Operations Manager/Supervisor网络工程师Network Engineer系统管理员/网络管理员System Manager/Webmaster网站策划Web Producer网站编辑Web Editor网页设计/制作/美工Web Designer/Production/Creative网络信息安全工程师Information Security Engineer智能大厦/综合布线Intelligent Building/Structure Cabling其他OthersIT-管理IT-Management首席技术执行官CTO/首席信息官CIO Chief Technology Officer CTO/Chief Information Officer CIO 技术总监/经理Technical Director/Manager信息技术经理/主管IT Manager/Supervisor信息技术专员IT Specialist项目总监Project Director项目经理Project Manager项目主管Project Supervisor项目执行/协调人员Project Specialist / Coordinator其他OthersIT-品管、技术支持及其它IT-QA, Technical Support...技术支持经理Technical Support Manager技术支持工程师Technical Support Engineer计量工程师Measure Engineer标准化工程师Standardization Engineer品质经理Quality Assurance QA Manager系统测试Systems Testing QA软件测试Software Testing QA硬件测试Hardware Testing QA测试员Test Engineer /Tester技术文员/助理Technical Clerk/Assistant其他Others通信技术Communication Technology通信技术工程师Communication Engineer有线传输工程师Wired Transmission Engineer无线通信工程师Wireless Communication Engineer电信交换工程师Telecommunication Exchange Engineer数据通信工程师Data Communication Engineer移动通信工程师Mobile Communication Engineer电信网络工程师Telecommunication Network Engineer通信电源工程师Communication Power Supply Engineer其他Others电子/电器/半导体/仪器仪表Electronics/Wiring/Semiconductor/Instrument/Industry集成电路IC设计/应用工程师IC Design/Application EngineerIC验证工程师IC Verification Engineer电子工程师/技术员Electronics Engineer电气工程师/技术员Electrical Engineer电路工程师/技术员Electronic Circuit Engineer电声/音响工程师/技术员Electroacoustics Engineer半导体技术Semiconductor Technology自动控制工程师/技术员Autocontrol Engineer/Technician电子软件开发(ARM/MCU...) Electronics Software (ARM/MCU…)嵌入式软件开发(Linux/单片机/DLC/DSP…) Embedded Software Engineer (Linux/SCM/DLC/DSP…) 电池/电源开发Battery/Power EngineerFAE 现场应用工程师Field Application Engineer (FAE)家用电器/数码产品研发Household Electronics/Digital Products Development仪器/仪表/计量Instrument/Measurement测试工程师Quality Testing Engineer其他Others销售管理Sales Management销售总监Sales Director销售经理Sales Manager销售主管Sales Supervisor渠道/分销经理Channel/Distribution Manager渠道/分销主管Channel/Distribution Supervisor客户经理Sales Account Manager区域销售总监Regional Sales Director区域销售经理Regional Sales Manager其他Others销售人员Salespersons销售代表Sales Representative / Executive渠道/分销专员Channel/Distribution Representative客户代表Sales Account Representative销售工程师Sales Engineer电话销售Telesales经销商Distributor其他Others销售行政及商务Sales Administration销售行政经理/主管Sales Admin. Manager/Supervisor销售行政专员/助理Sales Admin. Executive/Assistant商务经理Business Manager商务主管/专员Business Supervisor/Executive商务助理Business Assistant销售助理Sales Assistant / Trainee其他Others客服及技术支持Customer Service and Technical Support客服总监(非技术)Customer Service Director客服经理(非技术)Customer Service Manager客服主管(非技术)Customer Service Supervisor客服专员/助理(非技术)Customer Service Executive/Assistant 售前/售后技术支持经理Technical Support Manager售前/售后技术支持主管Technical Support Supervisor售前/售后技术支持工程师Technical Support Engineer咨询热线/呼叫中心服务人员Customer Hot Line/Call Center Staff 其他Others财务/审计/税务Finance/Accounting/Audit/Tax首席财务官CFO Chief Financial Officer CFO财务总监Finance Director财务经理Finance Manager财务顾问Finance Consultant财务主管/总帐主管Finance Supervisor会计经理/会计主管Accounting Manager/Supervisor会计Accountant / Accounting Trainee出纳员Cashier财务/会计助理Finance/Accounting Assistant财务分析经理/主管Financial Analysis Manager/Supervisor财务分析员Financial Analyst成本经理/成本主管Cost Accounting Manager/Supervisor成本管理员Cost Accounting Specialist审计经理/主管Audit Manager/Supervisor审计专员/助理Audit Executive/Assistant税务经理/税务主管Tax Manager/Supervisor税务专员/助理Tax Executive/Assistant统计员Statistician其他Others证券/金融/投资Securities/Finance/Investment证券/期货/外汇经纪人Securities Broker证券分析师Securities Analyst股票/期货操盘手Stocks/Futures Operator金融/经济研究员Financial Analyst/Economist投资/基金项目经理Investment Manager/Fund Manager投资/理财顾问Investment/Financial Management Advisor投资银行业务Investment Banking Specialist融资经理/融资主管Treasury Manager/Supervisor融资专员Treasury Specialist拍卖师Auction其他Others银行Banks行长/副行长President/Vice-President/Branch Manager资产评估/分析Assets Valuation/Analyst风险控制Risk Management信贷管理/信用调查/分析人员Loan/Credit Officer进出口/信用证结算Trading / LC Officer外汇交易Foreign Exchange清算人员Settlement Officer高级客户经理/客户经理Senior Relationship Manager客户主管/专员Relationship Supervisor/Executive银行柜员Bank Teller银行卡、电子银行业务推广Credit Card/E-banking business Develop 其他Others保险Insurance保险精算师Actuary保险产品开发/项目策划Product Development/Planner保险业务经理/主管Business Manager/Supervisor保险代理/经纪人/客户经理Agent/Broker/Account Manager理财顾问/财务规划师Financial Advisor/Financial Planner储备经理人Agency Management Associate保险核保Underwriting保险理赔Claim Management保险客户服务/续期管理Customer Service保险培训师Trainer保险内勤Staff其他Others生产/营运Manufacturing/Operation工厂经理/厂长Plant/Factory Manager总工程师/副总工程师Chief Engineer项目经理/主管Project Manager/Supervisor项目工程师Project Engineer营运经理Operations Manager营运主管Operations Supervisor生产经理/车间主任Production Manager/Workshop Supervisor生产计划协调员Production Planning Executive/Officer生产主管/督导/领班Production Supervisor/Team Leader化验员Laboratory Technician其他Others质量/安全管理Quality/Safety Management质量管理/测试经理(QA/QC经理) QA/QC Manager质量管理/测试主管(QA/QC主管) QA/QC Supervisor质量管理/测试工程师(QA/QC工程师) QA/QC Engineer质量检验员/测试员Quality Inspector/Tester可靠度工程师Reliability Engineer故障分析工程师Failure Analysis Engineer认证工程师/审核员Certification Engineer/Auditor体系工程师/审核员Systems Engineer/Auditor安全/健康/环境经理/主管Safety/Health/Environmental Manager/Supervisor 安全/健康/环境工程师Safety/Health/Environmental Engineer供应商管理Supplier/Vendor Management采购材料、设备质量管理Supplies & Equipment Quality Management 其他Others工程/机械/能源Engineering/Mechanical/Energy技术研发经理/主管Technical Design Mgr./Spvr.技术研发工程师Technical Design Engineer产品工艺/制程工程师Process Engineer产品规划工程师Product Planing Engineer实验室负责人/工程师Lab Manager/Engineer工程/设备经理Engineering/Facility Manager工程/设备主管Engineering/Facility Supervisor工程/设备工程师Engineering/Facility Engineer工程/机械绘图员Project Drafting Specialist/Mechanical Drawing工业工程师Industrial Engineer机械工程师Mechanical Engineer结构工程师Structrual Engineer模具工程师Tooling Engineer机电工程师Electrical& Mechanical Engineer维修工程师Maintenance Engineer铸造/锻造工程师Casting/Forging Engineer注塑工程师Injection Engineer焊接工程师Welding Engineer夹具工程师Clamp EngineerCNC工程师CNC Engineer冲压工程师Punch Engineer锅炉工程师Boiler Engineer电力工程师/技术员Electric Power Engineer光源与照明工程Lighting Engineer汽车/摩托车工程师Automotive Engineer船舶工程师Shipping Engineer飞行器设计与制造Aircraft Design & Manufacture其他Others技工Technician / Engineer Trainee技工Technician / Engineer Trainee钳工/机修工/钣金工Locksmith/Mechanic/Repairer电焊工/铆焊工Electric Welding Worker车工/磨工/铣工/冲压工/锣工Latheman/Grinder/Miller/Puncher/Turner 模具工Mould Worker电工Electrician叉车工Forklift Worker空调工/电梯工/锅炉工Air-Condition Worker/Lift Worker/Steam Worker 水工/木工/油漆工Plumber/Carpenter/Painter普工General Worker裁剪车缝熨烫Tailor汽车修理工Auto Repairing其他Others服装/纺织/皮革Apparels/Textiles/Leather Goods服装/纺织设计Fashion/Textiles Designer面料辅料开发Fabric/Accessories Development面料辅料采购Fabric/Accessories Purchasing服装/纺织/皮革跟单Apparels/Textiles/Leather Goods Merchandiser质量管理/验货员(QA/QC) Quality Management QA/QC板房/楦头/底格出格师Shoe Tree Design服装打样/制版Apparels Sample Production纸样师/车板工Paper Sample裁床Cut Bed其他Others采购Purchasing采购总监Purchasing Director采购经理Purchasing Manager采购主管Purchasing Supervisor采购员Purchasing Specialist/Staff采购助理Purchasing Assistant 选址拓展Location Development。

Practical Information Security - 说明书

Practical Information Security - 说明书

309© Springer International Publishing AG 2018 I. Alsmadi et al., Practical Information Security , https:///10.1007/978-3-319-72119-4AAccess controldatabase security mechanisms, 145multilevel, 146query modification, 146stored procedures, 146views, 146mobile and wireless security, 174Access Control Lists (ACLs), 56, 59, 63Address resolution protocol (ARP), 129Advanced Encryption Standard (AES), 99, 174Adwarefreeware/shareware, 22infected websites, 22infinite pop-ups, 21man-in-the-middle attacks, 21pop-up ads, 20slow down device’s, 21spying, 21users, 22Alternate Data Stream (ADS)ADSCheck, 217ADSSpy, 217, 218CAT tool, Nix Utilities, 217feature, 216hiding data, 217StreamArmor, 218Anti-Malware detection techniques, 196, 197Apple iOS security, 170Apple IPhones ™ cloud locks, 164Apple Mac’s FileVault, 109Applications sectionanti-virus software application, 13vulnerability scanning, 13–15ARP Spoofing attacks, 127–129Asset value, 9AttackerMalware, 140Network, 140notice, 144Attribute-based access control (ABAC), 66Authentication, Access control andAccountability (AAA), 64BBackdoors, 31BlowFish, 100Bootkits, 23Boot-sector viruses, 38Browser Hijacking, 41CCarriage return line feeds (CRLF) Injectionattacks, 42Certificate Authorities (CA), 104, 113Cipher Block Chaining (CBC), 97Cipher FeedBack (CFB), 97Code injection, 41–43Confidential information, 4Counter (CTR), 97Crimeware, 35–37Cross site request forgery (CSRF), 143, 144Cross-site Scripting (XSS), 42Crypto ransomware, 24Cyber-attacks, 121Index310DData encryption standard (DES), 62Data modification attacks, 126, 127 Database securityaccess control (see Access control,database security)applications, 155attack, SQL injection (see SQL injectionattack)management system, 144measures, 145privacyadding/deleting records, 147data perturbation/anonymization, 148output perturbation, 148query restriction, 148statistical database, 146, 147Denial of Service (DoS) attack, 5–6Digital Encryption Standard (DES), 96 Disaster Recovery Plan (DRP), 80, 85, 89 Discretionary Access Control (DAC), 56 Disk and computer forensicsADS, 216–218analysis, 208, 209applicationsKali Linux, 241Linux Logs, 241Linux Rootkit Checker, 242memory analysis with volatility, 240Windows registry, 241data recovery, 207, 208digital investigations, 204event viewers, 232, 233ext systems (see Extended file system (Ext)) factors, 204FAT system, 209, 210, 212, 213HFS+ systems, 221–222HFS+ volume headers, 222image acquisition, 205–207Internet usage and traces (see Internettraces)investigationsLinux (see Linux operating systems)MAC operating systems, 236, 237Windows operating systems, 227–229 memory (see Memory forensics)NTFS systems, 214–216operating system, 205skillsBinwalk disk forensic tool, 238file carving, 238–240foremost forensic tool, 237hex-editor program, 238raw format image acquisition, 238 unallocated disk, 214web logs, 233Windows registry, 229Distributed denial of service (DDoS) attack, 30 Distribution, Crimewareaffiliate marketing, 37attachment, 36hacking, 37Internet Worm, 36Piggybacking, 36Web Browser Exploit, 36Dynamic link library (DLL) file, 33EEICAR test files, 13Electronic Code Book (ECB), 97Electronic mail (email) virus, 38Email (Mail command/SMTP) injection, 42 Encrypted salt-sector initialization vector(ESSIV), 110Encrypting File System (EFS), 108 Ethernet Network cards (NIC), 251 Extended file system (Ext)file recovery, 220, 221high level layout, 218inode, 219journal process, 219Linux, 218Minix, 219eXtensible Access Control Markup Language (XACML), 70FFile allocation table (FAT) systemcorrupted data, 213data area, 210deleted data, 212DOS and Windows operating systems, 209 extensions, 213FAT12 disk sizes, 209, 210FAT16, FAT32 and NTFS, 210floppy, 209fsstat tool, 211hidden data, 212mmls tool, 211primary and backup FAT structures, 210reserved area, 210unallocated/formatted data, 213File infectors, 38File-sharing/peer-to-peer (P2P) worm, 28Index311Firmware, 24Flash worm, 28Foremost tool, 259, 260GGlobal Navigation Satellite Systems (GNSS), 301GNU Privacy Guard (GnuPG), 105HHardware, 24Hardware/network security issues in mobile/smart devices, 173Hardware-based keyloggersacoustic keyloggers, 34electromagnetic emissions, 34firmware-based, 34keyboard hardware, 34keyboard overlays, 34optical surveillance, 34physical evidence, 34smartphone sensors, 34wireless sniffers, 34Hierarchical file systems (HFS), 221, 222 Host header injection, 42HTML-Proxies, 29IInformation hiding and protectionasymmetric encryptionalgorithms, 100–104commitment schemes, 114cryptography applicationsApple OS/X, 109–111browsers, 105–107e-commerce, 104, 105email communication, 105Internet/online communications ande-commerce, 104operating systems and disks, 107–109telecommunication/networks, 107 digital time-stamping, 115encryption, 92experience/ability section, 119, 120hashing/steganography, 92information authentication, 113information concealment, 91, 92information concealment/authenticitytechniques, 115–117information integrity, 91information integrity and authenticationtechniques, 111–113information system/website, 92, 93knowledge sectionsciphering/encryption algorithms, 95cryptography/encryption, 93–95key-based encryption techniques, 95methods, 95message authentication, 113password storageand verification, 114, 115skills sectionencryption algorithms, 117encryption applications, 118information concealmentapplications, 119information integrity algorithms, 118information integrity applications, 118 symmetric encryption algorithmsblock ciphers, 95–100BlowFish, 100stream ciphers, 100Information locationdescription, 3hard and flash drives, 4in motion, 4Information security, 10–12Information security cases, 12, 13 Information sensitivitycategories, 4confidential information, 4private information, 5public information, 5Information statecreation, 2description, 2processing, 3storage, 3transition, 3Information taxonomy, 2Internet Bot, 31Internet DOS, 29Internet of Things (IoT), 11Internet Protocol Security (IPSec), 107 Internet Relay Chat (IRC) worm, 28 Internet tracesapplications, 229Google Chrome, 230, 232Mozilla Firefox, 231MS Internet explorer, 230OSI layers’ perspective, 230Intrusion Detection/Protection Systems (IDS/ IPS), 267–269Index312JJail-breaking, mobile devices, 172KKeyloggers, 32–35Knowledge sections, 1–12, 17–44LLightweight Directory Access Protocol(LDAP) injection attacks, 42 Linux operating systemsdirectories, 234disk forensics, 233forensic investigation, 234forensic investigator, 235forensic tools, 234Linux logon log files, 235tools, 235versions/flavors, 233web browsers, 235Linux Rootkit Checker, 242Linux Unified Key Setup (LUKS), 110 Locker ransomware, 24Logic bombs, 41MMAC flooding attack, 131, 132MAC operating systems, 236, 237 Macro viruses, 38Malware analysis, Software code security anti-malware detection techniques, 195 manual, 197NSRL server, 198software applications, 194Malware attacker, 140Malware threatsaccess or intrusion method, 164Android platform, 166Brain Test, 167Dendroid, 166Hiddad, 167hiding methods, 165payload, 164Pegasus spyware, 165Pretender Applications, 166propagation, 164RuMMS, 167Triada, 167ViperRAT, 166XcodeGhost, 167Malwaresapplications sectiondangerous website, 46–47Keylogger, 45, 46Microsoft safety scanner, 44, 45outlook account, 47, 48TDSSKiller, 48–50knowledge sectionsAdware, 20–22backdoors, 31browser Hijacking, 41classes, 18code injection, 41–43Crimeware, 35–37hardware-based keyloggers, 34, 35Internet Bot, 31, 32Keylogger, 32, 33logic bomb, 41pharming, 43phishing, 40Ransomware, 24–26Rogue security software, 31Rootkits, 22–24Scareware, 37software Bugs, 39software-based keyloggers, 33spamming, 40spyware, 18–20taxonomy of, 17Trojan horses, 29–31Viruses, 37–39Worms, 26, 28, 29skills section, 44Memory forensicsanalysis with volatility, 240BIOS, 223computing systems, 223data analysis, 223information, 223, 224ROM, 223size, 223toolsanalysis, 225Dumpit, 225FTK Imager memory capture, 226Linux, 227Redline, 226simple/generic, 225V olatilitux, 226volatility, 225, 226virtual, 223Mobile and wireless securityaccess control models, 174AES crypto-engine, 174age of using mobile phones, 161Index313anti-malware apps, 168application code signing, 162applications, 178booting process, 173bring your own device (BYOD), 162, 163 consumer reports, 161hardware/network, 173installation, unknown/un-trusted stores,167jail-breaking, 172location-based services and privacycontrol, 176malware threats (see Malware threats)operating systems, 170OSNs, 169physical thefts, 172remote wipe feature, 176Sandboxing, 171skillsSmart devices operating systems, 177Software security issues, 177theft and loss/unauthorized access, 163,164TLS/SSL, 175transmissions, 175unsecured network connection, 175updates, operating systems, 172usage, 161users/software, 162Mobile anti-malware systems, 168Mobile forensicscompany to seize, 307device folders, 305device information, installed apps, callhistory, contacts, and messaging,307device seize, 301device states, 300, 305GPS, 301, 306hardware and software, 299mobile device features, 298operating systems, 299, 300, 304SIM card, 300, 306tools, 301, 302Monte Carlo analysis, 79Multi-variant virus, 38NNAC, see Network access control (NAC) National Institute of Standards andTechnology (NIST), 99Near Field Communication (NFC), 299 Network access control (NAC), 125Network attacker, 140Network attacksaddress resolution protocol, 129countermeasures, 129data modification, 126, 127denial, service attack, 130eavesdropping, 125, 126MAC flooding, 131, 132Packet sniffers, 134SMURF, 133SpoofingARP, 127–129identification, 126TCP SYN flooding, 132Network forensicsARP spoofing, 273DHCP servers, 250Ethernet cards promiscuous mode, 251firewalls, 267Foremost, 259, 262, 273IDS/IPS, 267–269, 274, 275, 277, 279, 281 NIC Promisc Mode, 273packet filtering, 254–257, 261port mirroring, 264real time, analysis, 249routers, 265, 266SDN switches, 273static, analysis, 249switches, 261–264, 274traffic analysis, 247–249, 272wire tapping, 250wireless communication, 269, 270wireless tapping, 250, 251Wireshark, 252–255Network layer, 124Network securityapplication layer, 122applications, 137attacks (see Network attacks)cyber-attacks, 121network traffic analysis, 134–137OSI Model, 121–123transport Layer (see Transport layer)Non-resident viruses, 38NTFS systems, disk forensics, 214–216OObject-based access control (OBAC), 66, 67 Online Social Networks (OSNs), 169Open Systems Interconnection model (OSIModel)layers, 121, 122protocols, 123Index314Operating systems security issues, mobile/smart devices, 170 Organization’s risk tolerance, 73Output FeedBack (OFB), 97PPacket Sniffing attacks, 134Personal Information Manager (PIM), 299 Pharming, 43Phishing, 40Physical security, 126Physical thefts, mobile phones, 172 Physical-world DOS, 29Physical-world Reconnaissance, 29Policy Administration Point (PAP), 67 Policy Decision Point (PDP), 66Policy Enforcement Point (PEP), 66Private information, 5Public information, 5Public Key Encryption (PKE), 104RRadio frequency identification (RFID) virus, 38 Ransomware, 24, 26Remote wipe feature, 176Resident viruses, 38Riskdefinition, 73impact of, 73metrics, 74monitoring, 74response, 74security, 73tracking, 74Risk management and planningapplications’ sectionassessment/model, 89cyber security plan, 89–90knowledge sectionsapproaches, 76, 82, 83assessment and model, 79cyber security awareness, 81, 86disaster recovery, 80, 81, 85DRP sections, 85–86forensics resources, 81, 82incident response planning, 79, 80, 83, 84policies, 77, 78security, 75, 76self-assessment survey, 84, 85tolerance, 76, 77, 83skill’s sectiondevelopment process, 88disaster recovery plan, 89disaster recovery planning, 87–88incident response plan, 88metrics, 87security incident responses, 87tracking, 87Rivest-Shamir-Adleman (RSA), 101, 102 Rogue security software, 31Role-based access control (RBAC)and OBAC, 66, 67in MAC, 64permissions, 64policies/roles, 65policy-based security systems, 64 Rootkits, 22–24, 48–50RuMMS, 167SSandboxing, 171Scareware, 37Script virus, 38Secunia PSI software, 14Secure phone booting process, 173Secure shell (SSH), 107Secure Socket Tunneling Protocol (SSTP), 107 Secure Sockets Layer (SSL), 104Securitymobile and wireless (see Mobile andwireless security)web (see Web security)Security access controlsapplications sectionsOBAC systems, 70RBAC systems, 70websites and web-applications, 69 authentication, 55components, 55database management systems, 53different database management, 54different operating systems, 54different websites and web-applications, 54 knowledge sectionsdatabase management systems, 59, 60digital certificates, 62–63distributed and operating systems, 63, 64identity management, 61Kerberos, 62OBAC and RBAC, 56operating and file systems, 56–59permissions, 56session time-out, 62Index315SSO methods, 61websites and web-applications, 60–61 OBAC, 53, 54operating systems, 53RBAC, 53, 54 (see Role-based accesscontrol (RBAC))skills sectionsin Linux, 68, 69Windows SAM database, 67, 68 websites and web-applications, 53 Security awareness, 10Security countermeasurementdescription, 10human, 10legal, 10organizational, 10technical, 10Security education, 10Security goalsaccountability, 6authentication, 6authorization, 6a3vailability, 5confidentiality, 5description, 5identification, 6integrity, 5non-repudiation, 7privacy, 6Security risks, 7, 8Security threat, 8Security training, 10Single-Sign-On (SSO), 61Skills section, CIA triad - confidentiality,integrity and availability, 12, 13 Smart devices operating systems and security issues, 177SMURF attacks, 133Software Bugs, 39Software code securityevaluation, software programs, 198management and control of information, 183 perspectives, 199skillsMalwares, 198reviews, 198testing tools, 197and vulnerability issues (see Vulnerability, Software code security) Software Defined Networking (SDN)Controllers, 64Software security issues, smart devices, 177 Software-based keyloggers, 33API-based, 33grabbing based, 33hypervisor-based, 33Javascript-based, 33kernel-based, 33memory injection based, 33 Spamming, 40SpywareActiveX control, 19anti-spyware, 19browser add-ons, 19computer programs, 18devices, 19disable active-X, 20drive-by download, 19installation, 20piggybacked software installation, 19pop-up blocker, 20type of, 18"X" icon, 20SQL GRANT/REVOKE commands, 60 SQL injection (SQLi), 42SQL injection attackautomated, 149deleting, updating and inserting data, 154 initiation, 150input validation vulnerability, 150, 151mitigation, 152skills, 152, 153statements, 149steal data, 150, 152Web application, 154Yahoo V oices, 149Statistical database, 147Steal data, 150, 152Subscriber Identity Module (SIM) card, 300 Swarm worm, 28TTCP SYN flooding, 132TDSSKiller, 48, 49Theft and loss/unauthorized access, mobiledevices, 163, 164Time Stamping Authority (TSA), 115 Transmission Control Protocol (TCP), 122 Transport layerNetwork layer, 124routing and translation, addresses, 125types of addresses, Internet, 124, 125UDP, 123TCP, 122Transport Layer Security (TLS), 105Index316Transport Layer Security (TLS) or SecureSocket Layer (SSL), 175 Triada, 167Trojan horses, 29–31TrueCrypt, 110Trusted Third Party (TTP), 104UUbuntu shadow content, 114Unsecured wireless network connection, 175 User Datagram Protocol (UDP), 123User-mode/kernel-mode hybrid Rootkit, 23 Users/software security,mobile/smart devices, 162VVeraCrypt, 110Vetting, 162Virtual Private Networks (VPNs), 105 Virus detection pop-up window, 14Virus life cycledormant phase, 39execution phase, 39propagation phase, 39triggering phase, 39Viruses, 37–39Vulnerability, 9Vulnerability threats, 74Vulnerability, Software code securityanti-malware detectiontechniques, 195–197buffer and stack overflows, 184design flawschanges, 193control modules and APIs, 193encryption, 193sensitive data, 193validate user inputs, 192, 193design principlesand practices, 190–192exception handling, 194feedback exceptions, 194malware analysis, 195manual malware analysis, 197memory leak and violationissues, 185race conditions, 187, 188SQL injection and XSS, 185–187static and dynamic security analysis,188–190techniques and tools, 188WWarhol worm, 28Web application code, 140Web browser, 140Web forensicsartifacts for investigation, 294criminal and civil cases, 295criminal cases with web, 291emailand browsers information, 292clients, 285file reports, 291files, 289, 290forensics tools, 286, 287headers, 287–289headers review, 293mail servers, 285protocols, 285scan for archived files, 293software, 295steps, 284web browsers, 291, 292web browsing history, 294, 295Web logs, 233Web securityand database (see Database security)applications, 139, 155Cloud, 139online transactions, 139threat models, 140–144Web threat modelscross site scriptingCookie encryption, 143Cookies associated with a web page,142impacts, 143sever response, 142techniques, 141textbox and text area, 141, 142URL, 141CSRF, 143, 144malware attacker, 140network attacker, 140web attacker, 140Wide Area Networks (W AN), 265Windows operating systemsevent viewers, 232, 233forensic investigationsartifacts, 229backdoors/Rootkits, 228disk, 228keyword searches, 227malicious processes, 228Index317review, 227unauthorized user accounts/groups, 228versions of, 228Windows registry, 229, 241Wire tapping, 250Wireless security, see Mobile and wirelesssecurityWireless tapping, 250, 251Wormsactivation, 27malicious code, 26payloads, 28propagation techniques, 28scanning, 27types of, 27, 28XXcodeGhost, 167XML injection, 42XPath injection, 42Index。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

• Techniques
– Re-sampled images
• Correlations between neighboring pixels
– Color Filter Array (CFA) interpolated images
• Correlations are destroyed when the image is tampered

Examples
– Invisible inks, character arrangement, covert channels…
Sender !!!
..o xx.. Cover Message Genuine Message
Supervised Channel
..o xx..
Cover Message
– Detecting – Extracting – Disabling/destroying
Alice
Bob Eve

The attacking approaches vary depending upon the methods used to embed the information into the cover media
– Double compressions – Duplicated regions – Inconsistent noise patterns
12
References
• Neil F. Johnson and Sushil Jajodia , “Steganalysis: The Investigation of Hidden Information,” IEEE Information Technology Conference, New York, USA, September 1998 Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004 Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” Digital Forensic Research Workshop, 2004 Alin C. Popescu, Statistic Tools for Digital Image Forensics, PhD Dissertation, December 2004
4
Steganalysis
• • Hiding information within electronic media requires alternations of the media properties that may introduce some form of degradation or unusual characteristics Forms of attacks and analysis on hidden information
Example: A Secure Digital Camera
11
Statistical Techniques for Detecting Traces
• Assumption
– Digital forgeries, though visually imperceptible, alter some underlying statistical properties of natural images
• Watermarks will be undetectable when the content is changed in anyrking
• Watermark will survive only legitimate distortion
Receiver
..o xx..
!!!
Genuine Message + Cover Message
..o xx..
Normal Ink Invisible Ink Paper Paper with Messages Examination Heating Examination
3
Digital Steganography Schemes
• Various message carriers
– Digital contents
• Texts, images, audio, video
– Storage devices
• Unused space or hidden partition
– TCP/IP packets
• Unused or reserved bits in the headee
Biometrics
2
Steganography
• Steganography=“Cover” + “Writing”
– The art of hiding information in ways that prevent the detection of hidden messages – Transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded message is undetectable

face fingerprint iris user input
6
Requirements of Biometrics
• A biological measurement qualifies to be a biometric if it satisfies
– – – – Universality Distinctiveness Permanence Collectability
• Image tampering – Object removing – Composition – Morphing – Re-touching – Enhancing – Computer graphics – Painting
10
Watermarking-Based Forensics
• Watermarking-based schemes – Fragile watermarking
– Watermarks enabling distortion localization or restoration
• A major drawback – Watermarks must be embedded either at the time of recording or afterwards by a person authorized to do so
– Buildings – Computer systems – Laptops – Cell phones – ATMs
ID Card
Password
• “who he is” instead if “what he possesses” and “what he remembers”
9
Content Tampering
• A practical biometric system must satisfy
– Performance – Acceptability – Circumvention
7
A Biometric System
8
Applications of Biometrics
• Secure access to

• •
13
– An arms race?
5
Biometric Recognition
• Biometrics = “life”+”measure” • Automatic recognition of individuals based on their physiological and/or behavior characteristics
Introduction to Multimedia Security Topics Covered in this Course
Multimedia Security
Course Coverage
Multimedia Security Digital Rights Management DRM Standards Rights Languages Digital Watermarking DRM Laws Multimedia Cryptography Privacy-Preserving Data Mining Digital Forensics Steganography/ Steganalysis
相关文档
最新文档