Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information systems security and pri...
~
ICISSP (Conference) (2019 :)
Linked to FindBook
Google Book
Amazon
博客來
Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information systems security and privacy/ edited by Paolo Mori, Steven Furnell, Olivier Camp.
Reminder of title:
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
remainder title:
ICISSP 2019
other author:
Mori, Paolo.
corporate name:
ICISSP (Conference)
Published:
Cham :Springer International Publishing : : 2020.,
Description:
xii, 427 p. :ill., digital ;24 cm.
[NT 15003449]:
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
Contained By:
Springer eBooks
Subject:
Computer networks - Security measures -
Online resource:
https://doi.org/10.1007/978-3-030-49443-8
ISBN:
9783030494438
Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
Information systems security and privacy
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /[electronic resource] :ICISSP 2019edited by Paolo Mori, Steven Furnell, Olivier Camp. - Cham :Springer International Publishing :2020. - xii, 427 p. :ill., digital ;24 cm. - Communications in computer and information science,12211865-0929 ;. - Communications in computer and information science ;1221..
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
ISBN: 9783030494438
Standard No.: 10.1007/978-3-030-49443-8doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
LDR
:03489nmm a2200361 a 4500
001
2221073
003
DE-He213
005
20200628072919.0
006
m d
007
cr nn 008maaau
008
201216s2020 sz s 0 eng d
020
$a
9783030494438
$q
(electronic bk.)
020
$a
9783030494421
$q
(paper)
024
7
$a
10.1007/978-3-030-49443-8
$2
doi
035
$a
978-3-030-49443-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I16 2019
111
2
$a
ICISSP (Conference)
$n
(5th :
$d
2019 :
$c
Prague, Czech Republic)
$3
3459044
245
1 0
$a
Information systems security and privacy
$h
[electronic resource] :
$b
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
$c
edited by Paolo Mori, Steven Furnell, Olivier Camp.
246
3
$a
ICISSP 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 427 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
1221
505
0
$a
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
520
$a
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
891214
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Mori, Paolo.
$3
3221341
700
1
$a
Furnell, Steven.
$3
898634
700
1
$a
Camp, Olivier.
$3
838255
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
1221.
$3
3459045
856
4 0
$u
https://doi.org/10.1007/978-3-030-49443-8
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9394652
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login