Amazon cover image
Image from Amazon.com

Information systems security : 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020 : proceedings / Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 12553. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, [2020]Description: 1 online resource (xx, 289 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030656102
  • 3030656101
Other title:
  • ICISS 2020
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Access Control -- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT -- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against Trojan Attacks on Deep Neural Networks -- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning -- Machine Learning based Android Vulnerability Detection: A Roadmap -- Privacy and Web Security -- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach -- Privacy-Preserving Friend Recommendation in an Integrated Social Environment -- A Toolkit for Security Awareness Training against Targeted Phishing -- Forensic Source Identification of OSN Compressed Images -- Cryptography -- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency -- LiARX: A Lightweight Cipher based on the LTS Design Strategy of ARX -- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings -- Systems Security -- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information -- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security -- Detection of Malign and Benign PE Files Using Texture Analysis -- Estimating the Cost of Cybersecurity Activities with CAsPeA.
Summary: This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Access Control -- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT -- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against Trojan Attacks on Deep Neural Networks -- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning -- Machine Learning based Android Vulnerability Detection: A Roadmap -- Privacy and Web Security -- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach -- Privacy-Preserving Friend Recommendation in an Integrated Social Environment -- A Toolkit for Security Awareness Training against Targeted Phishing -- Forensic Source Identification of OSN Compressed Images -- Cryptography -- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency -- LiARX: A Lightweight Cipher based on the LTS Design Strategy of ARX -- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings -- Systems Security -- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information -- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security -- Detection of Malign and Benign PE Files Using Texture Analysis -- Estimating the Cost of Cybersecurity Activities with CAsPeA.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed February 12, 2021).

Powered by Koha