Fr. 103.00

Information Systems Security - 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024.
The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.

Sommario

.- System Security.
.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.
.- S-RFUP: Secure Remote Firmware Update Protocol.
.- Securing Virtual Reality Apps Inter-Process Communication.
.- Network Security.
.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.
.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.
.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.
.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).
.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.
.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.
.- QIris: Quantum Implementation of Rainbow Table Attacks.
.- Malware and Vulnerability Detection.
.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.
.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.
.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.
.- Privacy & Usability.
.- Web Privacy Perceptions Amongst Indian Users.
.- Enabling Privacy in IT Service Operations.
.- Privacy-Preserving Photo Sharing: An SSI Use Case.
.- Zone Recovery Attack on a Secure  Privacy-Preserving Ride-Matching Protocol.
.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.
.- A Decoupling Mechanism for Transaction Privacy.
.- AI Security.
.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.
.- MALAI: ML-based Attack on Learning With Error problem.
.- Patch based backdoor attack on Deep Neural Networks.
.- Industry Demo/Practice.
.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.
.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.
.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).
.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.

Dettagli sul prodotto

Con la collaborazione di Rudrapatna K Shyamasundar (Editore), Ram Krishnan (Editore), Vishwas T Patil (Editore), Vishwas T. Patil (Editore), Rudrapatna K Shyamasundar (Editore), Rudrapatna K. Shyamasundar (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 07.01.2025
 
EAN 9783031800191
ISBN 978-3-0-3180019-1
Pagine 474
Dimensioni 155 mm x 28 mm x 235 mm
Peso 791 g
Illustrazioni XLIX, 474 p. 162 illus., 132 illus. in color.
Serie Lecture Notes in Computer Science
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Computerhardware, Netzwerksicherheit, Netzwerk-Hardware, Data and Information Security, Computer Communication Networks, Network Security, Computer Engineering and Networks, Security Services, systems security, security and privacy, Intrusion/anomaly detection and malware mitigation, Security in hardware

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.