Information Systems Security (eBook, PDF)
20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings
Redaktion: Patil, Vishwas T.; Shyamasundar, Rudrapatna K.; Krishnan, Ram
60,95 €
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
60,95 €
Als Download kaufen
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
60,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Information Systems Security (eBook, PDF)
20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings
Redaktion: Patil, Vishwas T.; Shyamasundar, Rudrapatna K.; Krishnan, Ram
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024.
The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 32.72MB
Andere Kunden interessierten sich auch für
- Security and Trust Management (eBook, PDF)53,95 €
- Information Security and Privacy (eBook, PDF)73,95 €
- Intelligence and Security Informatics (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Security and Privacy in Communication Networks (eBook, PDF)73,95 €
- Security and Privacy in Communication Networks (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024.
The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 474
- Erscheinungstermin: 14. Dezember 2024
- Englisch
- ISBN-13: 9783031800207
- Artikelnr.: 72592910
- Verlag: Springer International Publishing
- Seitenzahl: 474
- Erscheinungstermin: 14. Dezember 2024
- Englisch
- ISBN-13: 9783031800207
- Artikelnr.: 72592910
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- System Security.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
.- System Security.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.