Information systems security and pri...
ICISSP (Conference) (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information systems security and privacy/ edited by Paolo Mori, Steven Furnell, Olivier Camp.
    Reminder of title: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
    remainder title: ICISSP 2019
    other author: Mori, Paolo.
    corporate name: ICISSP (Conference)
    Published: Cham :Springer International Publishing : : 2020.,
    Description: xii, 427 p. :ill., digital ;24 cm.
    [NT 15003449]: SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
    Contained By: Springer eBooks
    Subject: Computer networks - Security measures -
    Online resource: https://doi.org/10.1007/978-3-030-49443-8
    ISBN: 9783030494438
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login