Fr. 90.00

Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings

Inglese · Tascabile

Spedizione di solito entro 1 a 2 settimane (il titolo viene stampato sull'ordine)

Descrizione

Ulteriori informazioni

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022
The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc

Sommario

Ostinato: Cross-host Attack Correlation through Attack Activity SimilarityDetection.-DKS-PKI: A Distributed Key Server Architecture for Public KeyInfrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in PrivateRecord Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android MalwareDetection.-Samyukta: A Unified Access Control Model using Roles, Labels, andAttributes.-Efficient and Effective Static Android Malware Detection Using MachineLearning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection

Dettagli sul prodotto

Con la collaborazione di Venkata Ramana Badarla (Editore), Rudrapatna K Shyamasundar (Editore), Surya Nepal (Editore), Rudrapatna K. Shyamasundar (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 11.12.2022
 
EAN 9783031236891
ISBN 978-3-0-3123689-1
Pagine 273
Dimensioni 155 mm x 16 mm x 235 mm
Illustrazioni XXVIII, 273 p. 102 illus., 77 illus. in color.
Serie Lecture Notes in Computer Science
Categoria Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.