Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Systems Security: 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings

  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 15416
  • Izdošanas datums: 14-Dec-2024
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031800207
  • Formāts - PDF+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 15416
  • Izdošanas datums: 14-Dec-2024
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031800207

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 1620, 2024.





The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
.- System Security.

.- Microarchitectural Security of Firecracker VMM for Serverless Cloud
Platforms.

.- An OS support for Tamper-resistant Software Execution Using Empty
Interruptions.

.- S-RFUP: Secure Remote Firmware Update Protocol.

.- Securing Virtual Reality Apps Inter-Process Communication.

.- Network Security.

.- Securing the Web: Analysis of HTTP Security Headers in Popular Global
Websites.

.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular
Communications.

.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.

.- Effects of Soft-Domain Transfer and Named Entity Information on Deception
Detection.

.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation
and Analysis Framework (V2X-SAF).

.- From Traits to Threats: Learning Risk Indicators of Malicious Insider
using Psychometric Data.

.- Identifying Insecure Network Configurations through Attack Modeling and
Explainable AI.

.- QIris: Quantum Implementation of Rainbow Table Attacks.

.- Malware and Vulnerability Detection.

.- Insights from Running 24 Static Analysis Tools on Open Source Software
Repositories.

.- REMEDII: Robust Malware Detection with Iterative and Intelligent
Adversarial Training using GANs.

.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract
Interpretation.

.- Privacy & Usability.

.- Web Privacy Perceptions Amongst Indian Users.

.- Enabling Privacy in IT Service Operations.

.- Privacy-Preserving Photo Sharing: An SSI Use Case.

.- Zone Recovery Attack on a Secure  Privacy-Preserving Ride-Matching
Protocol.

.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability,
User Attention and Awareness.

.- A Decoupling Mechanism for Transaction Privacy.

.- AI Security.

.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.

.- MALAI: ML-based Attack on Learning With Error problem.

.- Patch based backdoor attack on Deep Neural Networks.

.- Industry Demo/Practice.

.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing
Efficiency, Security, and User Autonomy.

.- Ontologies for WAF configurations: when knowledge-graphs help
troubleshooting.

.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration
Automation and Response (SOAR).

.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system
for Zero Trust Network.