Muutke küpsiste eelistusi

E-raamat: Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings

Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 80,26 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023.

The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains. 

Systems Security.- A Security Analysis of Password Managers on
Android.- The Design and Application of a Unified Ontology for Cyber
Security.- Big Data Forensics on Apache Kafka.- A Survey on Security Threats
and Mitigation Strategies for NoSQL Databases MongoDB as a Use
Case.- Theoretical Enumeration of Deployable Single-output Strong PUF
Instances based on Uniformity and Uniqueness Constraints.- Network Security.-
Detection and Hardening Strategies to Secure an Enterprise Network.- Attack
Graph Based Security Metrics For Dynamic Networks.- An Energy-conscious
surveillance scheme for intrusion detection in underwater sensor networks
using Tunicate swarm optimization.- Security in AI/ML.- STN-Net: A Robust
GAN-Generated Face Detector.- MDLDroid: Multimodal Deep Learning based
Android Malware Detection.- A Cycle-GAN Based Image Encoding Scheme for
Privacy Enhanced Deep Neural Networks.- Secure KNN Computation On Cloud.- A
Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep
Learned and Computer Vision Oriented Features.- Privacy.- Security and
Privacy in Machine Learning.- Attack on the Privacy-Preserving Carpooling
Service TAROT.- Democracy in Your Hands!: Practical Multi-Key Homomorphic
E-Voting.- Cryptography.- Secured Collaboration with Ciphertext Policy
Attribute Based Signcryption in a Distributed Fog Environment for Medical
Data Sharing.- Verifiable Timed Accountable Subgroup
Multi-signatures.- Verifiable Timed Accountable Subgroup
Multi-signatures.- Blockchains.- Ensuring Data Security in the Context of IoT
Forensics Evidence Preservation with Blockchain and Self-Sovereign
Identities.- Analysis of Optimal Number of Shards using ShardEval, A
Simulator for Sharded Blockchains.- SoK: Digital Signatures and Taproot
Transactions in Bitcoin.- BCTPV-NIZK: Publicly-verifiable non-interactive
zero-knowledge proof system from minimal blockchain
assumptions.- Proof-of-Variable-Authority: A blockchain consensus mechanism
for securing IoT networks.- An Efficient Two-Party ECDSA Scheme for
Cryptocurrencies.- Secure Smart Grid Data Aggregation Based on Fog Computing
and Blockchain Technology.- Crypto-Ransomware Detection: A Honey-file based
approach using chi-square test.- PSDP: Blockchain-Based Computationally
Efficient Provably Secure Data Possession.- Private and Verifiable Inter-bank
Transactions and Settlements on Blockchain.