Information Systems Security (eBook, PDF)
19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings
Redaktion: Muthukkumarasamy, Vallipuram; Shyamasundar, Rudrapatna K.; Sudarsan, Sithu D.
59,95 €
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
59,95 €
Als Download kaufen
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Information Systems Security (eBook, PDF)
19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings
Redaktion: Muthukkumarasamy, Vallipuram; Shyamasundar, Rudrapatna K.; Sudarsan, Sithu D.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16-20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 30.4MB
Andere Kunden interessierten sich auch für
- Cyber Security, Cryptology, and Machine Learning (eBook, PDF)53,95 €
- Security and Privacy in Communication Networks (eBook, PDF)73,95 €
- Information Systems Security (eBook, PDF)60,95 €
- Applied Cryptography and Network Security Workshops (eBook, PDF)53,95 €
- Security and Privacy in Communication Networks (eBook, PDF)40,95 €
- Applied Cryptography and Network Security Workshops (eBook, PDF)53,95 €
- Information Systems Security (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16-20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 482
- Erscheinungstermin: 8. Dezember 2023
- Englisch
- ISBN-13: 9783031490996
- Artikelnr.: 69699159
- Verlag: Springer International Publishing
- Seitenzahl: 482
- Erscheinungstermin: 8. Dezember 2023
- Englisch
- ISBN-13: 9783031490996
- Artikelnr.: 69699159
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Systems Security.
A Security Analysis of Password Managers on Android.
The Design and Application of a Unified Ontology for Cyber Security.
Big Data Forensics on Apache Kafka.
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.
Theoretical Enumeration of Deployable Single
output Strong PUF Instances based on Uniformity and Uniqueness Constraints.
Network Security.
Detection and Hardening Strategies to Secure an Enterprise Network.
Attack Graph Based Security Metrics For Dynamic Networks.
An Energy
conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.
Security in AI/ML.
STN
Net: A Robust GAN
Generated Face Detector.
MDLDroid: Multimodal Deep Learning based Android Malware Detection.
A Cycle
GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Secure KNN Computation On Cloud.
A Multi
Stage Multi
Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.
Privacy.
Security and Privacy in Machine Learning.
Attack on the Privacy
Preserving Carpooling Service TAROT.
Democracy in Your Hands!: Practical Multi
Key Homomorphic E
Voting.
Cryptography.
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Verifiable Timed Accountable Subgroup Multi
signatures.
Verifiable Timed Accountable Subgroup Multi
signatures.
Blockchains.
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self
Sovereign Identities.
Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.
SoK: Digital Signatures and Taproot Transactions in Bitcoin.
BCTPV
NIZK: Publicly
verifiable non
interactive zero
knowledge proof system from minimal blockchain assumptions.
Proof
of
Variable
Authority: A blockchain consensus mechanism for securing IoT networks.
An Efficient Two
Party ECDSA Scheme for Cryptocurrencies.
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Crypto
Ransomware Detection: A Honey
file based approach using chi
square test.
PSDP: Blockchain
Based Computationally Efficient Provably Secure Data Possession.
Private and Verifiable Inter
bank Transactions and Settlements on Blockchain.
A Security Analysis of Password Managers on Android.
The Design and Application of a Unified Ontology for Cyber Security.
Big Data Forensics on Apache Kafka.
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.
Theoretical Enumeration of Deployable Single
output Strong PUF Instances based on Uniformity and Uniqueness Constraints.
Network Security.
Detection and Hardening Strategies to Secure an Enterprise Network.
Attack Graph Based Security Metrics For Dynamic Networks.
An Energy
conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.
Security in AI/ML.
STN
Net: A Robust GAN
Generated Face Detector.
MDLDroid: Multimodal Deep Learning based Android Malware Detection.
A Cycle
GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Secure KNN Computation On Cloud.
A Multi
Stage Multi
Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.
Privacy.
Security and Privacy in Machine Learning.
Attack on the Privacy
Preserving Carpooling Service TAROT.
Democracy in Your Hands!: Practical Multi
Key Homomorphic E
Voting.
Cryptography.
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Verifiable Timed Accountable Subgroup Multi
signatures.
Verifiable Timed Accountable Subgroup Multi
signatures.
Blockchains.
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self
Sovereign Identities.
Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.
SoK: Digital Signatures and Taproot Transactions in Bitcoin.
BCTPV
NIZK: Publicly
verifiable non
interactive zero
knowledge proof system from minimal blockchain assumptions.
Proof
of
Variable
Authority: A blockchain consensus mechanism for securing IoT networks.
An Efficient Two
Party ECDSA Scheme for Cryptocurrencies.
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Crypto
Ransomware Detection: A Honey
file based approach using chi
square test.
PSDP: Blockchain
Based Computationally Efficient Provably Secure Data Possession.
Private and Verifiable Inter
bank Transactions and Settlements on Blockchain.
Systems Security.
A Security Analysis of Password Managers on Android.
The Design and Application of a Unified Ontology for Cyber Security.
Big Data Forensics on Apache Kafka.
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.
Theoretical Enumeration of Deployable Single
output Strong PUF Instances based on Uniformity and Uniqueness Constraints.
Network Security.
Detection and Hardening Strategies to Secure an Enterprise Network.
Attack Graph Based Security Metrics For Dynamic Networks.
An Energy
conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.
Security in AI/ML.
STN
Net: A Robust GAN
Generated Face Detector.
MDLDroid: Multimodal Deep Learning based Android Malware Detection.
A Cycle
GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Secure KNN Computation On Cloud.
A Multi
Stage Multi
Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.
Privacy.
Security and Privacy in Machine Learning.
Attack on the Privacy
Preserving Carpooling Service TAROT.
Democracy in Your Hands!: Practical Multi
Key Homomorphic E
Voting.
Cryptography.
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Verifiable Timed Accountable Subgroup Multi
signatures.
Verifiable Timed Accountable Subgroup Multi
signatures.
Blockchains.
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self
Sovereign Identities.
Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.
SoK: Digital Signatures and Taproot Transactions in Bitcoin.
BCTPV
NIZK: Publicly
verifiable non
interactive zero
knowledge proof system from minimal blockchain assumptions.
Proof
of
Variable
Authority: A blockchain consensus mechanism for securing IoT networks.
An Efficient Two
Party ECDSA Scheme for Cryptocurrencies.
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Crypto
Ransomware Detection: A Honey
file based approach using chi
square test.
PSDP: Blockchain
Based Computationally Efficient Provably Secure Data Possession.
Private and Verifiable Inter
bank Transactions and Settlements on Blockchain.
A Security Analysis of Password Managers on Android.
The Design and Application of a Unified Ontology for Cyber Security.
Big Data Forensics on Apache Kafka.
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.
Theoretical Enumeration of Deployable Single
output Strong PUF Instances based on Uniformity and Uniqueness Constraints.
Network Security.
Detection and Hardening Strategies to Secure an Enterprise Network.
Attack Graph Based Security Metrics For Dynamic Networks.
An Energy
conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.
Security in AI/ML.
STN
Net: A Robust GAN
Generated Face Detector.
MDLDroid: Multimodal Deep Learning based Android Malware Detection.
A Cycle
GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Secure KNN Computation On Cloud.
A Multi
Stage Multi
Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.
Privacy.
Security and Privacy in Machine Learning.
Attack on the Privacy
Preserving Carpooling Service TAROT.
Democracy in Your Hands!: Practical Multi
Key Homomorphic E
Voting.
Cryptography.
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Verifiable Timed Accountable Subgroup Multi
signatures.
Verifiable Timed Accountable Subgroup Multi
signatures.
Blockchains.
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self
Sovereign Identities.
Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.
SoK: Digital Signatures and Taproot Transactions in Bitcoin.
BCTPV
NIZK: Publicly
verifiable non
interactive zero
knowledge proof system from minimal blockchain assumptions.
Proof
of
Variable
Authority: A blockchain consensus mechanism for securing IoT networks.
An Efficient Two
Party ECDSA Scheme for Cryptocurrencies.
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Crypto
Ransomware Detection: A Honey
file based approach using chi
square test.
PSDP: Blockchain
Based Computationally Efficient Provably Secure Data Possession.
Private and Verifiable Inter
bank Transactions and Settlements on Blockchain.