語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information systems security and pri...
~
ICISSP (Conference) (2020 :)
FindBook
Google Book
Amazon
博客來
Information systems security and privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information systems security and privacy/ edited by Steven Furnell ... [et al.].
其他題名:
6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
其他題名:
ICISSP 2020
其他作者:
Furnell, Steven.
團體作者:
ICISSP (Conference)
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xii, 245 p. :ill. (some col.), digital ;24 cm.
內容註:
Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures -
電子資源:
https://doi.org/10.1007/978-3-030-94900-6
ISBN:
9783030949006
Information systems security and privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
Information systems security and privacy
6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /[electronic resource] :ICISSP 2020edited by Steven Furnell ... [et al.]. - Cham :Springer International Publishing :2022. - xii, 245 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,15451865-0937 ;. - Communications in computer and information science ;1545..
Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
ISBN: 9783030949006
Standard No.: 10.1007/978-3-030-94900-6doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25 / I35 2020
Dewey Class. No.: 005.8
Information systems security and privacy = 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
LDR
:02790nmm a2200373 a 4500
001
2296949
003
DE-He213
005
20220119065101.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030949006
$q
(electronic bk.)
020
$a
9783030948993
$q
(paper)
024
7
$a
10.1007/978-3-030-94900-6
$2
doi
035
$a
978-3-030-94900-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I35 2020
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I16 2020
111
2
$a
ICISSP (Conference)
$n
(6th :
$d
2020 :
$c
Valletta, Malta)
$3
3592039
245
1 0
$a
Information systems security and privacy
$h
[electronic resource] :
$b
6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /
$c
edited by Steven Furnell ... [et al.].
246
3
$a
ICISSP 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xii, 245 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1545
505
0
$a
Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems.
520
$a
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Software Engineering.
$3
890874
700
1
$a
Furnell, Steven.
$3
898634
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1545.
$3
3592040
856
4 0
$u
https://doi.org/10.1007/978-3-030-94900-6
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9438841
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I35 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入