Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Information Systems Security -

Information Systems Security

18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings
Buch | Softcover
XXVIII, 273 Seiten
2022 | 1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-23689-1 (ISBN)
CHF 97,35 inkl. MwSt
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022
The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc

Ostinato: Cross-host Attack Correlation through Attack Activity SimilarityDetection.-DKS-PKI: A Distributed Key Server Architecture for Public KeyInfrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in PrivateRecord Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android MalwareDetection.-Samyukta: A Unified Access Control Model using Roles, Labels, andAttributes.-Efficient and Effective Static Android Malware Detection Using MachineLearning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection















Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XXVIII, 273 p. 102 illus., 77 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 468 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte application security • Application Security • Data security and privacy • Human-Centric Security • Network and Hardware Security • Systems Security
ISBN-10 3-031-23689-0 / 3031236890
ISBN-13 978-3-031-23689-1 / 9783031236891
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95