Information systems security and privacy 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers /: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers. (2020)
- Record Type:
- Book
- Title:
- Information systems security and privacy 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers /: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers. (2020)
- Main Title:
- Information systems security and privacy 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers
- Other Titles:
- ICISSP 2019
- Further Information:
- Note: Paolo Mori, Steven Furnell, Olivier Camp (eds.).
- Other Names:
- (Computer scientist), Mori, Paolo
Furnell, Steven, 1970-
Camp, Olivier
ICISSP (Conference), 5th - Contents:
- SPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- ImprovingSPROOF: A Decentralized Platform for Attribute-based Authentication -- Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues -- Information Technology Consulting Firms' Readiness for Managing Information Security Incidents -- Evaluation of Side-channel Key-recovery Attacks on LoRaWAN End-device -- Black-box Attacks via the Speech Interface using Linguistically Crafted Input -- Proposal and Performance Evaluation of an Order-specied Aggregate Authority-transfer Signature -- Context-aware Software-dened Networking for Automated Incident Response in Industrial Networks -- Transparency Enhancing Tools and the GDPR: Do They Match? -- User Study of the Eectiveness of a Privacy Policy Summarization Tool -- A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application -- Protection of User-dened Sensitive Attributes on Online Social Networks against Attribute Inference Attack via Adversarial Data Mining -- User Behavioral Biometrics and Machine Learning towards Improving User Authentication in Smartphones -- Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept -- The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms -- Hypervisor Memory Introspection and Hypervisor based Malware Honeypot -- Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs -- Analysing the Provenance of IoT Data -- Improving Interoperability in Multi-domain Enterprise Right Management Applications -- Fine-grained Access Control for Querying Over Encrypted Document-oriented Database. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (438 p.)
- Subjects:
- 005.8
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Data protection -- Congresses
Application software
Artificial intelligence
Computer networks
Computer security
Data encryption (Computer science)
Software engineering
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030494438
3030494438 - Related ISBNs:
- 9783030494421
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.513774
- Ingest File:
- 03_096.xml