Risks and security of Internet and systems : 16th international conference, CRiSIS 2021, virtual event, Ames, USA. November 12-13, 2021 : revised selected papers / Bo Luo, Mohamed Mosbah, Frédéric Cuppens, Lotfi Ben Othmane, Nora Cuppens, Slim Kallel (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 13204.Publisher: Cham : Springer, [2022]Copyright date: ©2022Description: 1 online resource : illustrations (some color)Content type: - text
- computer
- online resource
- 9783031020674
- 3031020677
- CRiSIS 2021
- Computer networks -- Security measures -- Congresses
- Internet -- Security measures -- Congresses
- Computer security -- Congresses
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Internet -- Sécurité -- Mesures -- Congrès
- Sécurité informatique -- Congrès
- Computer networks -- Security measures
- Computer security
- Internet -- Security measures
- Xarxes d'ordinadors
- Internet
- Seguretat informàtica
- 005.8 23
- TK5105.59 .I58 2021
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
This book constitutes the proceedings of the 16th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic. The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.
CPS and Hardware Security Threat Modeling of Cyber-Physical Systems in Practice -- AVSDA: Autonomous Vehicle Security Decay Assessment -- A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting -- Responses, and Security Management A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems -- A Novel Approach for Attack Tree to Attack Graph Transformation -- Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search -- Using Garbled Circuit for Secure Brokering -- Network and Data Security Path-preserving Anonymization for Inter-domain Routing Policiescal Systems in Practice -- Designing a Service for Compliant Sharing of Sensitive Research Data -- Authenticated Multi-Proxy Accumulation Schemes for Delegated Membership Proofs -- Extending the Exposure Score of Web Browsers By Incorporating CVSS.
Online resource; title from PDF title page (SpringerLink, viewed April 13, 2022).