| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911046534703321 |
|
|
Autore |
Lenzini Gabriele |
|
|
Titolo |
Information Systems Security and Privacy : 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22–24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26–28, 2024, Revised Selected Papers / / edited by Gabriele Lenzini, Paolo Mori, Steven Furnell |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2026.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (500 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 2459 |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer networks |
Computer systems |
Image processing - Digital techniques |
Computer vision |
Artificial intelligence |
Data and Information Security |
Computer Communication Networks |
Computer System Implementation |
Computer Imaging, Vision, Pattern Recognition and Graphics |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Management and Operations -- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection -- Secure Multi-Party Querying Federated Graph Databases -- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty -- Applications and Services -- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs -- Evaluating Input Transformation Ensembles Against |
|
|
|
|
|
|
|
|
|
|
|
Adversarial Attacks -- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks -- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations -- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis -- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map -- Efficient Management Models for SGX Enclaves -- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods -- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication -- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution -- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction -- A Peek into the Ecosystem of TPM v2. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations. |
|
|
|
|
|
|
|
| |