Information Systems Security
Springer International Publishing (Verlag)
978-3-031-49098-9 (ISBN)
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16-20, 2023.
The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
Systems Security.- A Security Analysis of Password Managers on Android.- The Design and Application of a Unified Ontology for Cyber Security.- Big Data Forensics on Apache Kafka.- A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.- Theoretical Enumeration of Deployable Single-output Strong PUF Instances based on Uniformity and Uniqueness Constraints.- Network Security.- Detection and Hardening Strategies to Secure an Enterprise Network.- Attack Graph Based Security Metrics For Dynamic Networks.- An Energy-conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.- Security in AI/ML.- STN-Net: A Robust GAN-Generated Face Detector.- MDLDroid: Multimodal Deep Learning based Android Malware Detection.- A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.- Secure KNN Computation On Cloud.- A Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.- Privacy.- Security and Privacy in Machine Learning.- Attack on the Privacy-Preserving Carpooling Service TAROT.- Democracy in Your Hands!: Practical Multi-Key Homomorphic E-Voting.- Cryptography.- Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.- Verifiable Timed Accountable Subgroup Multi-signatures.- Verifiable Timed Accountable Subgroup Multi-signatures.- Blockchains.- Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities.- Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.- SoK: Digital Signatures and Taproot Transactions in Bitcoin.- BCTPV-NIZK: Publicly-verifiable non-interactive zero-knowledge proof system from minimal blockchain assumptions.- Proof-of-Variable-Authority: A blockchain consensus mechanism for securing IoT networks.- An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.- Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.- Crypto-Ransomware Detection: A Honey-file based approach using chi-square test.- PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession.- Private and Verifiable Inter-bank Transactions and Settlements on Blockchain.
Erscheinungsdatum | 12.12.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XXXI, 482 p. 116 illus., 87 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 783 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | application security • Blockchains • cryptography • Data security and privacy • Distributed Systems Security • Human-Centric Security • intrusion/anomaly detection and malware mitigation • Network and Hardware Security • Network Security • privacy • Security in AI/ML • Systems Security |
ISBN-10 | 3-031-49098-3 / 3031490983 |
ISBN-13 | 978-3-031-49098-9 / 9783031490989 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich