Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers Herausgegeben:Meng, Weizhi; Katsikas, Sokratis K.
Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers Herausgegeben:Meng, Weizhi; Katsikas, Sokratis K.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021._ The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. _Due to the COVID-19 pandemic the conference was held online.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021._ The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. _Due to the COVID-19 pandemic the conference was held online.
Produktdetails
Produktdetails
Communications in Computer and Information Science 1403
Practical and Provable Secure Vehicular Component Protection Scheme.- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint.- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain.- AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing.- Granularity and Usability in Authorization Policies.- A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information.- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating.- Digital Twin Monitoring for Cyber-Physical Access Control.- Improving Host-based Intrusion Detection Using Thread Information.- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Practical and Provable Secure Vehicular Component Protection Scheme.- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint.- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain.- AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing.- Granularity and Usability in Authorization Policies.- A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information.- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating.- Digital Twin Monitoring for Cyber-Physical Access Control.- Improving Host-based Intrusion Detection Using Thread Information.- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497