Cantitate/Preț
Produs

Emerging Information Security and Applications: Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers: Communications in Computer and Information Science, cartea 1403

Editat de Weizhi Meng, Sokratis K. Katsikas
en Limba Engleză Paperback – 13 ian 2022
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.*

The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. 

*Due to the COVID-19 pandemic the conference was held online. 
Citește tot Restrânge

Din seria Communications in Computer and Information Science

Preț: 41365 lei

Preț vechi: 51706 lei
-20% Nou

Puncte Express: 620

Preț estimativ în valută:
7917 8233$ 6625£

Carte tipărită la comandă

Livrare economică 14-28 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030939557
ISBN-10: 3030939553
Pagini: 199
Ilustrații: XII, 199 p. 63 illus., 33 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.3 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Cham, Switzerland

Cuprins

Practical and Provable Secure Vehicular Component Protection Scheme.- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint.- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain.-  AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing.- Granularity and Usability in Authorization Policies.-  A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information.- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating.- Digital Twin Monitoring for Cyber-Physical Access Control.- Improving Host-based Intrusion Detection Using Thread Information.- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.