Lenzini / Mori / Furnell | Information Systems Security and Privacy | Buch | 978-3-031-89517-3 | sack.de

Buch, Englisch, 338 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 540 g

Reihe: Communications in Computer and Information Science

Lenzini / Mori / Furnell

Information Systems Security and Privacy

9th International Conference, ICISSP 2023, Lisbon, Portugal, 22-24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26-28, 2024, Revised Selected Papers
Erscheinungsjahr 2025
ISBN: 978-3-031-89517-3
Verlag: Springer

9th International Conference, ICISSP 2023, Lisbon, Portugal, 22-24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26-28, 2024, Revised Selected Papers

Buch, Englisch, 338 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 540 g

Reihe: Communications in Computer and Information Science

ISBN: 978-3-031-89517-3
Verlag: Springer


This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.

The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.

Lenzini / Mori / Furnell Information Systems Security and Privacy jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Management and Operations.- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection.- Secure Multi-Party Querying Federated Graph Databases.- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty.- Applications and Services.- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs.- Evaluating Input Transformation Ensembles Against Adversarial Attacks.- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks.- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations.- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis.- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.- Efficient Management Models for SGX Enclaves.- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods.- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication.- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution.- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction.- A Peek into the Ecosystem of TPM v2.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.