Information Systems Security
Springer International Publishing (Verlag)
978-3-031-80019-1 (ISBN)
- Noch nicht erschienen - erscheint am 24.01.2025
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024.
The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
.- System Security.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
Erscheint lt. Verlag | 24.1.2025 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XXXVI, 465 p. 156 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | intrusion/anomaly detection and malware mitigation • Network Security • Security and Privacy • security in hardware • security services • Systems Security |
ISBN-10 | 3-031-80019-2 / 3031800192 |
ISBN-13 | 978-3-031-80019-1 / 9783031800191 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich