Badarla / Shyamasundar / Nepal | Information Systems Security | Buch | 978-3-031-23689-1 | sack.de

Buch, Englisch, Band 13784, 273 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 464 g

Reihe: Lecture Notes in Computer Science

Badarla / Shyamasundar / Nepal

Information Systems Security

18th International Conference, ICISS 2022, Tirupati, India, December 16¿20, 2022, Proceedings

Buch, Englisch, Band 13784, 273 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 464 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-23689-1
Verlag: Springer Nature Switzerland


This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022
The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc
Badarla / Shyamasundar / Nepal Information Systems Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Ostinato: Cross-host Attack Correlation through Attack Activity SimilarityDetection.-DKS-PKI: A Distributed Key Server Architecture for Public KeyInfrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in PrivateRecord Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android MalwareDetection.-Samyukta: A Unified Access Control Model using Roles, Labels, andAttributes.-Efficient and Effective Static Android Malware Detection Using MachineLearning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection
















Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.