home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

badarla venkata ramana (curatore); nepal surya (curatore); shyamasundar rudrapatna k. (curatore) - information systems security

Information Systems Security 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings

; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
70,98 €
NICEPRICE
67,43 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 12/2022
Edizione: 1st ed. 2022





Trama

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022

The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity
detection; DKS-PKI: a distributed key server architecture for public key
infrastructure;generating-set evaluation of bloom filter hardening techniques in private
record linkage; etc




Sommario

Ostinato: Cross-host Attack Correlation through Attack Activity Similarity
Detection.-DKS-PKI: A Distributed Key Server Architecture for Public Key
Infrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private
Record Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android Malware
Detection.-Samyukta: A Unified Access Control Model using Roles, Labels, and
Attributes.-Efficient and Effective Static Android Malware Detection Using Machine
Learning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection


























Altre Informazioni

ISBN:

9783031236891

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XXVIII, 273 p. 102 illus., 77 illus. in color.
Pagine Arabe: 273
Pagine Romane: xxviii


Dicono di noi