Atjaunināt sīkdatņu piekrišanu

Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 46, 2020, Revised Selected Papers 1st ed. 2021 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 378 pages, height x width: 235x155 mm, weight: 599 g, 56 Illustrations, color; 37 Illustrations, black and white; XI, 378 p. 93 illus., 56 illus. in color., 1 Paperback / softback
  • Sērija : Information Systems and Applications, incl. Internet/Web, and HCI 12528
  • Izdošanas datums: 12-Feb-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030688860
  • ISBN-13: 9783030688868
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 378 pages, height x width: 235x155 mm, weight: 599 g, 56 Illustrations, color; 37 Illustrations, black and white; XI, 378 p. 93 illus., 56 illus. in color., 1 Paperback / softback
  • Sērija : Information Systems and Applications, incl. Internet/Web, and HCI 12528
  • Izdošanas datums: 12-Feb-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030688860
  • ISBN-13: 9783030688868
This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic.





The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length.





The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.
Keynote Talk
New Dimensions of Information Warfare: The Economic Pillar---Fintech and Cryptocurrencies
3(28)
Maurantonio Capralu
Stefano Cresci
Simone Raponi
Roberto Di Pietro
Vulnerabilities, Attacks and Intrusion Detection
Measuring and Modeling Software Vulnerability Security Advisory Platforms
31(18)
Lucas Miranda
Daniel Vieira
Mateus Nogueira
Leonardo Ventura
Miguel Bicudo
Matheus Martins
Lucas Senos
Leandro P. de Aguiar
Enrico Lovat
Daniel Menasche
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs
49(18)
Karim Lounis
Mohammad Zulkernine
A Deeper Analysis of Adversarial Examples in Intrusion Detection
67(20)
Mohamed Amine Merzouk
Frederic Cuppens
Nora Boulahia-Cuppens
Reda Yaich
TLS, Openness and Security Control
Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits
87(18)
Olivier Levillain
Security Through Transparency and Openness in Computer Design
105(12)
Ivo Emanuilov
An ML Behavior-Based Security Control for Smart Home Systems
117(16)
Noureddine Amraoui
Belhassen Zouari
Access Control, Risk Assessment and Security Knowledge
A Posteriori Analysis of Policy Temporal Compliance
133(16)
Farah Dernaika
Nora Cuppens-Boulahia
Frederic Cuppens
Olivier Raynaud
Asset-Driven Approach for Security Risk Assessment in IoT Systems
149(15)
Salim Chehida
Abdelhakim Baouya
Diego Fernandez Alonso
Paul-Emmanuel Brun
Guillemette Massot
Marius Bozga
Saddek Bensalem
Heterogeneous Security Events Prioritization Using Auto-encoders
164(17)
Alexandre Dey
Eric Totel
Sylvain Navers
Community Knowledge About Security: Identification and Classification of User Contributions
181(20)
Fabien Patrick Viertel
Wasja Brunotte
Yannick Evers
Kurt Schneider
Risk Analysis, Neural Networks and Web Protection
Modelling Security Risk Scenarios Using Subjective Attack Trees
201(18)
Nasser Al-Hadhrami
Matthew Collinson
Nir Oren
Premium Access to Convolutional Neural Networks
219(16)
Julien Bringer
Herve Chabanne
Linda Guiga
An OWASP Top Ten Driven Survey on Web Application Protection Methods
235(20)
Ouissem Ben Fredj
Omar Cheikhrouhou
Moez Krichen
Habib Hamam
Abdelouahid Derhab
Infrastructure Security and Malware Detection
Autonomous Vehicle Security: Literature Review of Real Attack Experiments
255(18)
Siham Bouchelaghem
Abdelmadjid Bouabdallah
Mawloud Omar
New Dataset for Industry 4.0 to Address the Change in Threat Landscape
273(16)
Salwa Alem
David Espes
Eric Martin
Laurent Nana
Florent de Lamotte
Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning
289(22)
Souad El Hatib
Loic Ricaud
Josee Desharnais
Nadia Tawbi
Short Papers
Augmented Voting Reality
311(6)
Herve Chabanne
Emmanuelle Dottax
Denis Dumont
Malicious Http Request Detection Using Code-Level Convolutional Neural Network
317(8)
Ines Jemal
Mohamed Amine Haddar
Omar Cheikhrouhou
Adel Mahfoudhi
Enhancement of a Business Model with a Business Contextual Risk Model
325(10)
Zakariya Kamagale
Jacques Simonin
Yvon Kermarrec
Secure Data Processing for Industrial Remote Diagnosis and Maintenance
335(12)
Walid Arabi
Reda Yaich
Aymen Boudguiga
Mawloud Omar
Towards Attacker Attribution for Risk Analysis
347(7)
Elena Doynikova
Evgenia Novikova
Diana Gaifulina
Igor Kotenko
Modelling and Verification of Safety of Access Control in SCADA Systems
354(11)
Inna Vistbakka
Elena Troubitsyna
Security Assessment and Hardening of Autonomous Vehicles
365(12)
Samir Ouchani
Abdelaziz Khaled
Author Index 377