Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Systems Security -

Information Systems Security

16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings
Buch | Softcover
XX, 289 Seiten
2020 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-65609-6 (ISBN)
CHF 112,30 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.

The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Access Control.- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values.- Reliability and Security for Safety-Critical Service Compositions.- AI/ML in Security.- A Defence Against Trojan Attacks on Deep Neural Networks.- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning.- Machine Learning based Android Vulnerability Detection: A Roadmap.- Privacy and Web Security.- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach.- Privacy-Preserving Friend Recommendation in an Integrated Social Environment.- A Toolkit for Security Awareness Training against Targeted Phishing.- Forensic Source Identification of OSN Compressed Images.- Cryptography.- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency.- LiARX: A Lightweight Cipher based on the LTS DesignStrategy of ARX.- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.- Systems Security.- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security.- Detection of Malign and Benign PE Files Using Texture Analysis.- Estimating the Cost of Cybersecurity Activities with CAsPeA.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XX, 289 p. 83 illus., 56 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 480 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Applications • Artificial Intelligence • authentication • computer crime • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • conference proceedings • cryptography • Data Security • Economics of Security and Privacy • Education • Image Processing • Informatics • Information flow control • machine learning • Network Protocols • Network Security • Research • Security and Privacy • Signal Processing • Telecommunication Systems
ISBN-10 3-030-65609-8 / 3030656098
ISBN-13 978-3-030-65609-6 / 9783030656096
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95