語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information systems security and pri...
~
ICISSP (Conference) (2019 :)
FindBook
Google Book
Amazon
博客來
Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information systems security and privacy/ edited by Paolo Mori, Steven Furnell, Olivier Camp.
其他題名:
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
其他題名:
ICISSP 2019
其他作者:
Mori, Paolo.
團體作者:
ICISSP (Conference)
出版者:
Cham :Springer International Publishing : : 2020.,
面頁冊數:
xii, 427 p. :ill., digital ;24 cm.
內容註:
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
Contained By:
Springer eBooks
標題:
Computer networks - Security measures -
電子資源:
https://doi.org/10.1007/978-3-030-49443-8
ISBN:
9783030494438
Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
Information systems security and privacy
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /[electronic resource] :ICISSP 2019edited by Paolo Mori, Steven Furnell, Olivier Camp. - Cham :Springer International Publishing :2020. - xii, 427 p. :ill., digital ;24 cm. - Communications in computer and information science,12211865-0929 ;. - Communications in computer and information science ;1221..
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
ISBN: 9783030494438
Standard No.: 10.1007/978-3-030-49443-8doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information systems security and privacy = 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
LDR
:03489nmm a2200361 a 4500
001
2221073
003
DE-He213
005
20200628072919.0
006
m d
007
cr nn 008maaau
008
201216s2020 sz s 0 eng d
020
$a
9783030494438
$q
(electronic bk.)
020
$a
9783030494421
$q
(paper)
024
7
$a
10.1007/978-3-030-49443-8
$2
doi
035
$a
978-3-030-49443-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I16 2019
111
2
$a
ICISSP (Conference)
$n
(5th :
$d
2019 :
$c
Prague, Czech Republic)
$3
3459044
245
1 0
$a
Information systems security and privacy
$h
[electronic resource] :
$b
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
$c
edited by Paolo Mori, Steven Furnell, Olivier Camp.
246
3
$a
ICISSP 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 427 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
1221
505
0
$a
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
520
$a
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
891214
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Mori, Paolo.
$3
3221341
700
1
$a
Furnell, Steven.
$3
898634
700
1
$a
Camp, Olivier.
$3
838255
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
1221.
$3
3459045
856
4 0
$u
https://doi.org/10.1007/978-3-030-49443-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9394652
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入