Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.
The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Management and Operations.- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection.- Secure Multi-Party Querying Federated Graph Databases.- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty.- Applications and Services.- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs.- Evaluating Input Transformation Ensembles Against Adversarial Attacks.- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks.- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations.- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis.- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.- Efficient Management Models for SGX Enclaves.- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods.- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication.- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution.- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction.- A Peek into the Ecosystem of TPM v2.
Management and Operations.- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection.- Secure Multi-Party Querying Federated Graph Databases.- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty.- Applications and Services.- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs.- Evaluating Input Transformation Ensembles Against Adversarial Attacks.- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks.- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations.- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis.- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.- Efficient Management Models for SGX Enclaves.- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods.- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication.- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution.- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction.- A Peek into the Ecosystem of TPM v2.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826