Information Systems Security
18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings
(Sprache: Englisch)
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022
The 8 full papers and 5 short papers included in this book were carefully...
The 8 full papers and 5 short papers included in this book were carefully...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
69.54 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenlose Rücksendung
- Ratenzahlung möglich
Produktdetails
Produktinformationen zu „Information Systems Security “
Klappentext zu „Information Systems Security “
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc
Inhaltsverzeichnis zu „Information Systems Security “
Ostinato: Cross-host Attack Correlation through Attack Activity SimilarityDetection.-DKS-PKI: A Distributed Key Server Architecture for Public KeyInfrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in PrivateRecord Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android MalwareDetection.-Samyukta: A Unified Access Control Model using Roles, Labels, andAttributes.-Efficient and Effective Static Android Malware Detection Using MachineLearning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and DetectionBibliographische Angaben
- 2022, 1st ed. 2022, XXVIII, 273 Seiten, 77 farbige Abbildungen, Maße: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben: Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar
- Verlag: Springer, Berlin
- ISBN-10: 3031236890
- ISBN-13: 9783031236891
Sprache:
Englisch
Kommentar zu "Information Systems Security"
0 Gebrauchte Artikel zu „Information Systems Security“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Information Systems Security".
Kommentar verfassen