000 04335nam a22006375i 4500
001 978-3-030-65610-2
003 DE-He213
005 20240423125335.0
007 cr nn 008mamaa
008 201205s2020 sz | s |||| 0|eng d
020 _a9783030656102
_9978-3-030-65610-2
024 7 _a10.1007/978-3-030-65610-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Systems Security
_h[electronic resource] :
_b16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings /
_cedited by Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXX, 289 p. 83 illus., 56 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12553
505 0 _aAccess Control -- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT -- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against Trojan Attacks on Deep Neural Networks -- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning -- Machine Learning based Android Vulnerability Detection: A Roadmap -- Privacy and Web Security -- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach -- Privacy-Preserving Friend Recommendation in an Integrated Social Environment -- A Toolkit for Security Awareness Training against Targeted Phishing -- Forensic Source Identification of OSN Compressed Images -- Cryptography -- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency -- LiARX: A Lightweight Cipher based on the LTS DesignStrategy of ARX -- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings -- Systems Security -- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information -- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security -- Detection of Malign and Benign PE Files Using Texture Analysis -- Estimating the Cost of Cybersecurity Activities with CAsPeA.
520 _aThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aCoding theory.
650 0 _aInformation theory.
650 0 _aComputers.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCoding and Information Theory.
650 2 4 _aComputing Milieux.
700 1 _aKanhere, Salil.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPatil, Vishwas T.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSural, Shamik.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGaur, Manoj S.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030656096
776 0 8 _iPrinted edition:
_z9783030656119
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12553
856 4 0 _uhttps://doi.org/10.1007/978-3-030-65610-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c176891
_d176891