Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings

  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 14424
  • Izdošanas datums: 08-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031490996
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 14424
  • Izdošanas datums: 08-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031490996
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023.

The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains. 

Systems Security.- A Security Analysis of Password Managers on
Android.- The Design and Application of a Unified Ontology for Cyber
Security.- Big Data Forensics on Apache Kafka.- A Survey on Security Threats
and Mitigation Strategies for NoSQL Databases MongoDB as a Use
Case.- Theoretical Enumeration of Deployable Single-output Strong PUF
Instances based on Uniformity and Uniqueness Constraints.- Network Security.-
Detection and Hardening Strategies to Secure an Enterprise Network.- Attack
Graph Based Security Metrics For Dynamic Networks.- An Energy-conscious
surveillance scheme for intrusion detection in underwater sensor networks
using Tunicate swarm optimization.- Security in AI/ML.- STN-Net: A Robust
GAN-Generated Face Detector.- MDLDroid: Multimodal Deep Learning based
Android Malware Detection.- A Cycle-GAN Based Image Encoding Scheme for
Privacy Enhanced Deep Neural Networks.- Secure KNN Computation On Cloud.- A
Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep
Learned and Computer Vision Oriented Features.- Privacy.- Security and
Privacy in Machine Learning.- Attack on the Privacy-Preserving Carpooling
Service TAROT.- Democracy in Your Hands!: Practical Multi-Key Homomorphic
E-Voting.- Cryptography.- Secured Collaboration with Ciphertext Policy
Attribute Based Signcryption in a Distributed Fog Environment for Medical
Data Sharing.- Verifiable Timed Accountable Subgroup
Multi-signatures.- Verifiable Timed Accountable Subgroup
Multi-signatures.- Blockchains.- Ensuring Data Security in the Context of IoT
Forensics Evidence Preservation with Blockchain and Self-Sovereign
Identities.- Analysis of Optimal Number of Shards using ShardEval, A
Simulator for Sharded Blockchains.- SoK: Digital Signatures and Taproot
Transactions in Bitcoin.- BCTPV-NIZK: Publicly-verifiable non-interactive
zero-knowledge proof system from minimal blockchain
assumptions.- Proof-of-Variable-Authority: A blockchain consensus mechanism
for securing IoT networks.- An Efficient Two-Party ECDSA Scheme for
Cryptocurrencies.- Secure Smart Grid Data Aggregation Based on Fog Computing
and Blockchain Technology.- Crypto-Ransomware Detection: A Honey-file based
approach using chi-square test.- PSDP: Blockchain-Based Computationally
Efficient Provably Secure Data Possession.- Private and Verifiable Inter-bank
Transactions and Settlements on Blockchain.