Atjaunināt sīkdatņu piekrišanu

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 1620, 2020, Proceedings 1st ed. 2020 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 289 pages, height x width: 235x155 mm, weight: 480 g, 56 Illustrations, color; 27 Illustrations, black and white; XX, 289 p. 83 illus., 56 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 12553
  • Izdošanas datums: 06-Dec-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030656098
  • ISBN-13: 9783030656096
  • Mīkstie vāki
  • Cena: 69,22 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 81,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 289 pages, height x width: 235x155 mm, weight: 480 g, 56 Illustrations, color; 27 Illustrations, black and white; XX, 289 p. 83 illus., 56 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 12553
  • Izdošanas datums: 06-Dec-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030656098
  • ISBN-13: 9783030656096
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.

The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Access Control.- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values.- Reliability and Security for Safety-Critical Service Compositions.- AI/ML in Security.- A Defence Against Trojan Attacks on Deep Neural Networks.- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning.- Machine Learning based Android Vulnerability Detection: A Roadmap.- Privacy and Web Security.- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach.- Privacy-Preserving Friend Recommendation in an Integrated Social Environment.- A Toolkit for Security Awareness Training against Targeted Phishing.- Forensic Source Identification of OSN Compressed Images.- Cryptography.- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency.- LiARX: A Lightweight Cipher based on the LTS Design Strategy of ARX.- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.- Systems Security.- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security.- Detection of Malign and Benign PE Files Using Texture Analysis.- Estimating the Cost of Cybersecurity Activities with CAsPeA.