Muutke küpsiste eelistusi

E-raamat: Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings

Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022

The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ?ostinato: cross-host attack correlation through attack activity similarity
detection; DKS-PKI: a distributed key server architecture for public key
infrastructure;generating-set evaluation of bloom filter hardening techniques in private
record linkage; etc
Ostinato: Cross-host Attack Correlation through Attack Activity Similarity
Detection.-DKS-PKI: A Distributed Key Server Architecture for Public Key
Infrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private
Record Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android Malware
Detection.-Samyukta: A Unified Access Control Model using Roles, Labels, and
Attributes.-Efficient and Effective Static Android Malware Detection Using Machine
Learning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection