Muutke küpsiste eelistusi

Risks and Security of Internet and Systems: 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 1213, 2021, Revised Selected Papers 1st ed. 2022 [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 183 pages, kõrgus x laius: 235x155 mm, kaal: 308 g, 16 Illustrations, color; 14 Illustrations, black and white; XII, 183 p. 30 illus., 16 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 13204
  • Ilmumisaeg: 09-Apr-2022
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031020669
  • ISBN-13: 9783031020667
  • Pehme köide
  • Hind: 53,33 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 62,74 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 183 pages, kõrgus x laius: 235x155 mm, kaal: 308 g, 16 Illustrations, color; 14 Illustrations, black and white; XII, 183 p. 30 illus., 16 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 13204
  • Ilmumisaeg: 09-Apr-2022
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031020669
  • ISBN-13: 9783031020667
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic.

The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.

CPS and Hardware Security
Threat Modeling of Cyber-Physical Systems in Practice
3(17)
Ameerah-Muhsinah Jamil
Lotfi Ben Othmane
Altaz Valani
AVSDA: Autonomous Vehicle Security Decay Assessment
20(18)
Lama Moukahal
Mohammad Zulkernine
Martin Soukup
A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting
38(19)
Mohammad Sina Karvandi
Saleh Khalaj Monfared
Mohammad Sina Kiarostami
Dara Rahmati
Saeid Gorgin
Attacks, Responses, and Security Management
A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems
57(17)
Anirban Sengupta
A Novel Approach for Attack Tree to Attack Graph Transformation
74(17)
Nathan Daniel Schiele
Olga Gadyatskaya
Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search
91(17)
Camilo Correa
Jacques Robin
Raul Mazo
Salvador Abreu
Using Garbled Circuit for Secure Brokering
108(13)
Lotfi Ben Othmane
Noor Ahmed
Network and Data Security
Path-Preserving Anonymization for Inter-domain Routing Policies
121(16)
Xiaozhe Shao
Hossein Pishro-Nik
Lixin Gao
Policy Modeling and Anomaly Detection in ABAC Policies
137(18)
Maryam Davari
Mohammad Zulkernine
Short Papers
Designing a Service for Compliant Sharing of Sensitive Research Data
155(7)
Aakash Sharma
Thomas Bye Nilsen
Sivert Johansen
Dag Johansen
Havard D. Johansen
Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs
162(10)
Hannes Salin
Dennis Fokin
Alexander Johansson
Extending the Exposure Score of Web Browsers by Incorporating CVSS
172(11)
Fadi Mohsen
Adel Shtayyeh
Riham Naser
Lena Mohammad
Marten Struijk
Author Index 183