Cantitate/Preț
Produs

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings: Lecture Notes in Computer Science, cartea 12553

Editat de Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur
en Limba Engleză Paperback – 6 dec 2020
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 47742 lei

Preț vechi: 59678 lei
-20% Nou

Puncte Express: 716

Preț estimativ în valută:
9143 9894$ 7622£

Carte tipărită la comandă

Livrare economică 09-23 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030656096
ISBN-10: 3030656098
Pagini: 289
Ilustrații: XX, 289 p. 83 illus., 56 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.44 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Access Control.- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values.- Reliability and Security for Safety-Critical Service Compositions.- AI/ML in Security.- A Defence Against Trojan Attacks on Deep Neural Networks.- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning.- Machine Learning based Android Vulnerability Detection: A Roadmap.- Privacy and Web Security.- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach.- Privacy-Preserving Friend Recommendation in an Integrated Social Environment.- A Toolkit for Security Awareness Training against Targeted Phishing.- Forensic Source Identification of OSN Compressed Images.- Cryptography.- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency.- LiARX: A Lightweight Cipher based on the LTS DesignStrategy of ARX.- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.- Systems Security.- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security.- Detection of Malign and Benign PE Files Using Texture Analysis.- Estimating the Cost of Cybersecurity Activities with CAsPeA.