語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information systems security and pri...
~
(1998 :)
Information systems security and privacy5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information systems security and privacyedited by Paolo Mori, Steven Furnell, Olivier Camp.
其他題名:
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
其他題名:
ICISSP 2019
其他作者:
Mori, Paolo.
團體作者:
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
xii, 427 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer networksCongresses.Security measures
電子資源:
https://doi.org/10.1007/978-3-030-49443-8
ISBN:
9783030494438$q(electronic bk.)
Information systems security and privacy5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
Information systems security and privacy
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /[electronic resource] :ICISSP 2019edited by Paolo Mori, Steven Furnell, Olivier Camp. - Cham :Springer International Publishing :2020. - xii, 427 p. :ill., digital ;24 cm. - Communications in computer and information science,12211865-0929 ;. - Communications in computer and information science ;229..
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
ISBN: 9783030494438$q(electronic bk.)
Standard No.: 10.1007/978-3-030-49443-8doiSubjects--Topical Terms:
384553
Computer networks
--Security measures--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information systems security and privacy5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
LDR
:03431nmm a2200361 a 4500
001
580408
003
DE-He213
005
20200628072919.0
006
m
007
cr
008
210105s2020
020
$a
9783030494438$q(electronic bk.)
020
$a
9783030494421$q(paper)
024
7
$a
10.1007/978-3-030-49443-8
$2
doi
035
$a
978-3-030-49443-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I16 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Information systems security and privacy
$h
[electronic resource] :
$b
5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019 : revised selected papers /
$c
edited by Paolo Mori, Steven Furnell, Olivier Camp.
246
3
$a
ICISSP 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xii, 427 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
1221
505
0
$a
SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database.
520
$a
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Data protection
$v
Congresses.
$3
384517
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
273711
650
2 4
$a
Artificial Intelligence.
$3
212515
700
1
$a
Mori, Paolo.
$3
773761
700
1
$a
Furnell, Steven.
$3
260036
700
1
$a
Camp, Olivier.
$3
254692
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
229.
$3
547963
856
4 0
$u
https://doi.org/10.1007/978-3-030-49443-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000185067
電子館藏
1圖書
電子書
EB QA76.9.A25 I16 2019 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-49443-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入