Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information systems security and pri...
~
ICISSP (Conference) (2020 :)
Linked to FindBook
Google Book
Amazon
博客來
Information systems security and privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information systems security and privacy/ edited by Steven Furnell ... [et al.].
Reminder of title:
6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
remainder title:
ICISSP 2020
other author:
Furnell, Steven.
corporate name:
ICISSP (Conference)
Published:
Cham :Springer International Publishing : : 2022.,
Description:
xii, 245 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures -
Online resource:
https://doi.org/10.1007/978-3-030-94900-6
ISBN:
9783030949006
Information systems security and privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
Information systems security and privacy
6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /[electronic resource] :ICISSP 2020edited by Steven Furnell ... [et al.]. - Cham :Springer International Publishing :2022. - xii, 245 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,15451865-0937 ;. - Communications in computer and information science ;1545..
Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
ISBN: 9783030949006
Standard No.: 10.1007/978-3-030-94900-6doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25 / I35 2020
Dewey Class. No.: 005.8
Information systems security and privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
LDR
:02790nmm a2200373 a 4500
001
2296949
003
DE-He213
005
20220119065101.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030949006
$q
(electronic bk.)
020
$a
9783030948993
$q
(paper)
024
7
$a
10.1007/978-3-030-94900-6
$2
doi
035
$a
978-3-030-94900-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I35 2020
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I16 2020
111
2
$a
ICISSP (Conference)
$n
(6th :
$d
2020 :
$c
Valletta, Malta)
$3
3592039
245
1 0
$a
Information systems security and privacy
$h
[electronic resource] :
$b
6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
$c
edited by Steven Furnell ... [et al.].
246
3
$a
ICISSP 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xii, 245 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1545
505
0
$a
Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.
520
$a
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Software Engineering.
$3
890874
700
1
$a
Furnell, Steven.
$3
898634
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1545.
$3
3592040
856
4 0
$u
https://doi.org/10.1007/978-3-030-94900-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9438841
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I35 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login