Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information systems security = 20th ...
~
ICISS (Conference) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Information systems security = 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information systems security/ edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar.
Reminder of title:
20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 : proceedings /
remainder title:
ICISS 2024
other author:
Patil, Vishwas T.
corporate name:
ICISS (Conference)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xlix, 474 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
System Security. -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions. -- S-RFUP: Secure Remote Firmware Update Protocol. -- Securing Virtual Reality Apps Inter-Process Communication. -- Network Security. -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol. -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data. -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI. -- QIris: Quantum Implementation of Rainbow Table Attacks. -- Malware and Vulnerability Detection. -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs. -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation. -- Privacy & Usability. -- Web Privacy Perceptions Amongst Indian Users. -- Enabling Privacy in IT Service Operations. -- Privacy-Preserving Photo Sharing: An SSI Use Case. -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. -- A Decoupling Mechanism for Transaction Privacy. -- AI Security. -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs. -- MALAI: ML-based Attack on Learning With Error problem. -- Patch based backdoor attack on Deep Neural Networks. -- Industry Demo/Practice. -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting. -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR). -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-80020-7
ISBN:
9783031800207
Information systems security = 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 : proceedings /
Information systems security
20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 : proceedings /[electronic resource] :ICISS 2024edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar. - Cham :Springer Nature Switzerland :2025. - xlix, 474 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,154160302-9743 ;. - Lecture notes in computer science ;15416..
System Security. -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions. -- S-RFUP: Secure Remote Firmware Update Protocol. -- Securing Virtual Reality Apps Inter-Process Communication. -- Network Security. -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol. -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data. -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI. -- QIris: Quantum Implementation of Rainbow Table Attacks. -- Malware and Vulnerability Detection. -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs. -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation. -- Privacy & Usability. -- Web Privacy Perceptions Amongst Indian Users. -- Enabling Privacy in IT Service Operations. -- Privacy-Preserving Photo Sharing: An SSI Use Case. -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. -- A Decoupling Mechanism for Transaction Privacy. -- AI Security. -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs. -- MALAI: ML-based Attack on Learning With Error problem. -- Patch based backdoor attack on Deep Neural Networks. -- Industry Demo/Practice. -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting. -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR). -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024. The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
ISBN: 9783031800207
Standard No.: 10.1007/978-3-031-80020-7doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information systems security = 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 : proceedings /
LDR
:04121nmm a2200373 a 4500
001
2408119
003
DE-He213
005
20241214115304.0
006
m o d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031800207
$q
(electronic bk.)
020
$a
9783031800191
$q
(paper)
024
7
$a
10.1007/978-3-031-80020-7
$2
doi
035
$a
978-3-031-80020-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I16 2024
111
2
$a
ICISS (Conference)
$n
(20th :
$d
2024 :
$c
Jaipur, India)
$3
3780374
245
1 0
$a
Information systems security
$h
[electronic resource] :
$b
20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024 : proceedings /
$c
edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar.
246
3
$a
ICISS 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xlix, 474 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
15416
505
0
$a
System Security. -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions. -- S-RFUP: Secure Remote Firmware Update Protocol. -- Securing Virtual Reality Apps Inter-Process Communication. -- Network Security. -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol. -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data. -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI. -- QIris: Quantum Implementation of Rainbow Table Attacks. -- Malware and Vulnerability Detection. -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs. -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation. -- Privacy & Usability. -- Web Privacy Perceptions Amongst Indian Users. -- Enabling Privacy in IT Service Operations. -- Privacy-Preserving Photo Sharing: An SSI Use Case. -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. -- A Decoupling Mechanism for Transaction Privacy. -- AI Security. -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs. -- MALAI: ML-based Attack on Learning With Error problem. -- Patch based backdoor attack on Deep Neural Networks. -- Industry Demo/Practice. -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting. -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR). -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
520
$a
This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024. The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
737949
650
0
$a
Information networks
$x
Access control
$v
Congresses.
$3
1085542
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Patil, Vishwas T.
$3
3780375
700
1
$a
Krishnan, Ram.
$3
3594587
700
1
$a
Shyamasundar, Rudrapatna.
$3
1069356
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15416.
$3
3780376
856
4 0
$u
https://doi.org/10.1007/978-3-031-80020-7
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513617
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login