Atjaunināt sīkdatņu piekrišanu

Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 1620, 2023, Proceedings 1st ed. 2023 [Mīkstie vāki]

  • Formāts: Paperback / softback, 482 pages, height x width: 235x155 mm, weight: 783 g, 87 Illustrations, color; 29 Illustrations, black and white; XXXI, 482 p. 116 illus., 87 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14424
  • Izdošanas datums: 09-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031490983
  • ISBN-13: 9783031490989
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 73,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 86,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 482 pages, height x width: 235x155 mm, weight: 783 g, 87 Illustrations, color; 29 Illustrations, black and white; XXXI, 482 p. 116 illus., 87 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14424
  • Izdošanas datums: 09-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031490983
  • ISBN-13: 9783031490989
Citas grāmatas par šo tēmu:

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023.

The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains. 

Systems Security.- A Security Analysis of Password Managers on
Android.- The Design and Application of a Unified Ontology for Cyber
Security.- Big Data Forensics on Apache Kafka.- A Survey on Security Threats
and Mitigation Strategies for NoSQL Databases MongoDB as a Use
Case.- Theoretical Enumeration of Deployable Single-output Strong PUF
Instances based on Uniformity and Uniqueness Constraints.- Network Security.-
Detection and Hardening Strategies to Secure an Enterprise Network.- Attack
Graph Based Security Metrics For Dynamic Networks.- An Energy-conscious
surveillance scheme for intrusion detection in underwater sensor networks
using Tunicate swarm optimization.- Security in AI/ML.- STN-Net: A Robust
GAN-Generated Face Detector.- MDLDroid: Multimodal Deep Learning based
Android Malware Detection.- A Cycle-GAN Based Image Encoding Scheme for
Privacy Enhanced Deep Neural Networks.- Secure KNN Computation On Cloud.- A
Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep
Learned and Computer Vision Oriented Features.- Privacy.- Security and
Privacy in Machine Learning.- Attack on the Privacy-Preserving Carpooling
Service TAROT.- Democracy in Your Hands!: Practical Multi-Key Homomorphic
E-Voting.- Cryptography.- Secured Collaboration with Ciphertext Policy
Attribute Based Signcryption in a Distributed Fog Environment for Medical
Data Sharing.- Verifiable Timed Accountable Subgroup
Multi-signatures.- Verifiable Timed Accountable Subgroup
Multi-signatures.- Blockchains.- Ensuring Data Security in the Context of IoT
Forensics Evidence Preservation with Blockchain and Self-Sovereign
Identities.- Analysis of Optimal Number of Shards using ShardEval, A
Simulator for Sharded Blockchains.- SoK: Digital Signatures and Taproot
Transactions in Bitcoin.- BCTPV-NIZK: Publicly-verifiable non-interactive
zero-knowledge proof system from minimal blockchain
assumptions.- Proof-of-Variable-Authority: A blockchain consensus mechanism
for securing IoT networks.- An Efficient Two-Party ECDSA Scheme for
Cryptocurrencies.- Secure Smart Grid Data Aggregation Based on Fog Computing
and Blockchain Technology.- Crypto-Ransomware Detection: A Honey-file based
approach using chi-square test.- PSDP: Blockchain-Based Computationally
Efficient Provably Secure Data Possession.- Private and Verifiable Inter-bank
Transactions and Settlements on Blockchain.