Emerging Information Security and Applications
Springer International Publishing (Verlag)
978-3-030-93955-7 (ISBN)
The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.
*Due to the COVID-19 pandemic the conference was held online.
Practical and Provable Secure Vehicular Component Protection Scheme.- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint.- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain.- AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing.- Granularity and Usability in Authorization Policies.- A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information.- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating.- Digital Twin Monitoring for Cyber-Physical Access Control.- Improving Host-based Intrusion Detection Using Thread Information.- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Erscheinungsdatum | 14.01.2022 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | XII, 199 p. 63 illus., 33 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 332 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | Access Control • Applications • Artificial Intelligence • authentication • Communication Systems • Computer Hardware • Computer Networks • computer programming • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Data communication systems • Data Security • Informatics • Network Protocols • Network Security • Research • Security Systems • Signal Processing • Software engineering • Telecommunication networks • Telecommunication Systems • wireless telecommunication systems |
ISBN-10 | 3-030-93955-3 / 3030939553 |
ISBN-13 | 978-3-030-93955-7 / 9783030939557 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich