Custom cover image
Custom cover image

Information Systems Security : 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings / edited by Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: Security and Cryptology ; 12553 | Springer eBook CollectionPublisher: Cham : Springer International Publishing, 2020Publisher: Cham : Imprint: Springer, 2020Edition: 1st ed. 2020Description: 1 Online-Ressource(XX, 289 p. 83 illus., 56 illus. in color.)ISBN:
  • 9783030656102
Subject(s): Additional physical formats: 9783030656096 | 9783030656119 | Erscheint auch als: 9783030656096 Druck-Ausgabe | Erscheint auch als: 9783030656119 Druck-AusgabeDDC classification:
  • 005.8 23
DOI: DOI: 10.1007/978-3-030-65610-2Online resources: Summary: Access Control -- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT -- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against Trojan Attacks on Deep Neural Networks -- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning -- Machine Learning based Android Vulnerability Detection: A Roadmap -- Privacy and Web Security -- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach -- Privacy-Preserving Friend Recommendation in an Integrated Social Environment -- A Toolkit for Security Awareness Training against Targeted Phishing -- Forensic Source Identification of OSN Compressed Images -- Cryptography -- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency -- LiARX: A Lightweight Cipher based on the LTS Design Strategy of ARX -- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings -- Systems Security -- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information -- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security -- Detection of Malign and Benign PE Files Using Texture Analysis -- Estimating the Cost of Cybersecurity Activities with CAsPeA.Summary: This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.PPN: PPN: 1743801971Package identifier: Produktsigel: ZDB-2-LNC | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB
No physical items for this record