Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Systems Security and Privacy -

Information Systems Security and Privacy

9th International Conference, ICISSP 2023, Lisbon, Portugal, 22–24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26–28, 2024, Revised Selected Papers
Buch | Softcover
XVI, 338 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-89517-3 (ISBN)
CHF 164,75 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.

The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.

Management and Operations.- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection.- Secure Multi-Party Querying Federated Graph Databases.- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty.- Applications and Services.- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs.- Evaluating Input Transformation Ensembles Against Adversarial Attacks.- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks.- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations.- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis.- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.- Efficient Management Models for SGX Enclaves.- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods.- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication.- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution.- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction.- A Peek into the Ecosystem of TPM v2.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XVI, 338 p. 115 illus., 86 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte AI and machine learning for security • Architectures and Protocols • authentication • biometrics • cryptographic algorithms • data and software security • Identification • intrusion detection and response • Privacy and Security Models • privacy-enhancing models and technologies • risk and reputation management • security and privacy in cloud and pervasive computing • security and privacy metrics • security architecture and design analysis • security awareness and education • security frameworks • security in IoT and edge computing • security testing • threat awareness • vulnerability analysis and countermeasures
ISBN-10 3-031-89517-7 / 3031895177
ISBN-13 978-3-031-89517-3 / 9783031895173
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95