Buch, Englisch, Band 12553, 289 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g
16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings
Buch, Englisch, Band 12553, 289 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 476 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-65609-6
Verlag: Springer International Publishing
The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Access Control.- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT.- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values.- Reliability and Security for Safety-Critical Service Compositions.- AI/ML in Security.- A Defence Against Trojan Attacks on Deep Neural Networks.- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning.- Machine Learning based Android Vulnerability Detection: A Roadmap.- Privacy and Web Security.- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach.- Privacy-Preserving Friend Recommendation in an Integrated Social Environment.- A Toolkit for Security Awareness Training against Targeted Phishing.- Forensic Source Identification of OSN Compressed Images.- Cryptography.- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency.- LiARX: A Lightweight Cipher based on the LTS DesignStrategy of ARX.- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.- Systems Security.- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security.- Detection of Malign and Benign PE Files Using Texture Analysis.- Estimating the Cost of Cybersecurity Activities with CAsPeA.