Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Information Systems Security and Privacy : 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22–24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26–28, 2024, Revised Selected Papers / edited by Gabriele Lenzini, Paolo Mori, Steven Furnell

Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: Communications in Computer and Information Science ; 2459Verlag: Cham : Springer Nature Switzerland, 2026Verlag: Cham : Imprint: Springer, 2026Auflage: 1st ed. 2026Beschreibung: 1 Online-Ressource(XVI, 338 p. 115 illus., 86 illus. in color.)ISBN:
  • 9783031895180
Schlagwörter: Andere physische Formen: 9783031895173 | 9783031895197 | Erscheint auch als: 9783031895173 Druck-Ausgabe | Erscheint auch als: 9783031895197 Druck-AusgabeDDC-Klassifikation:
  • 005.8 23
DOI: DOI: 10.1007/978-3-031-89518-0Online-Ressourcen: Zusammenfassung: Management and Operations -- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection -- Secure Multi-Party Querying Federated Graph Databases -- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty -- Applications and Services -- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs -- Evaluating Input Transformation Ensembles Against Adversarial Attacks -- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks -- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations -- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis -- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map -- Efficient Management Models for SGX Enclaves -- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods -- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication -- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution -- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction -- A Peek into the Ecosystem of TPM v2.Zusammenfassung: This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.PPN: PPN: 1931986649Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-SCS | ZDB-2-SXCS
Dieser Titel hat keine Exemplare

Barrierefreier Inhalt: Accessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.