Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers /: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers. (2019)
- Record Type:
- Book
- Title:
- Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers /: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers. (2019)
- Main Title:
- Risks and security of internet and systems : 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised selected papers
- Other Titles:
- CRiSIS 2018
- Further Information:
- Note: Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens (eds.).
- Editors:
- Zemmari, Akka
Mosbah, Mohamed
Cuppens-Boulahia, Nora
Cuppens, Frédéric - Other Names:
- International Conference on Risks and Security of Internet and Systems, 13th
- Contents:
- An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams.- Are Third-Party Libraries Secure? A Software Library Checker for Java.- A prediction-based method for False Data Injection Attacks Detection in Industrial Control Systems.- Outsourcing Signatures of Confidential Documents.- Trust evaluation model for attack detection in Social Internet of Things.- A certificate-less key exchange protocol for IoT.- Personalized, Browser-based Visual Phishing Detection Based on Deep Learning.- Privacy Preserving Data Offloading based on Transformation.- DSTC: DNS-based Strict TLS Configurations.- Authenticated Quality of Service Aware Routing in Software Defined Networks.- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper).- Enhancing Collaboration between Security Analysts in Security Operations Centers.- RIICS: Risk based IICS segmentation Method.- Effectiveness and Impact measurements of a diversification based Moving Target Defense.- Practical security exploits of the FlexRay in-vehicle communication Protocol.- Connection Dumping Vulnerability Affecting Bluetooth Availability.- A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.- Optimal Distribution of Privacy Budget in Differential Privacy.
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (x, 237 pages), illustrations (some color)
- Subjects:
- 005.8
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Computer security -- Congresses
Electronic books - Languages:
- English
- ISBNs:
- 9783030121433
3030121437 - Related ISBNs:
- 9783030121426
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed February 1, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.383918
- Ingest File:
- 02_369.xml