03020nam 22007095 450 991048408330332120251226203214.03-319-13841-310.1007/978-3-319-13841-1(CKB)3710000000325031(SSID)ssj0001408276(PQKBManifestationID)11782370(PQKBTitleCode)TC0001408276(PQKBWorkID)11346794(PQKB)10917212(DE-He213)978-3-319-13841-1(MiAaPQ)EBC6296174(MiAaPQ)EBC5579399(Au-PeEL)EBL5579399(OCoLC)900120461(PPN)183152352(EXLCZ)99371000000032503120141203d2014 u| 0engurnn|008mamaatxtccrInformation Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings /edited by Atul Prakash, Rudrapatna Shyamasundar1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XXIV, 478 p. 163 illus.) Security and Cryptology,2946-1863 ;8880Bibliographic Level Mode of Issuance: Monograph3-319-13840-5 Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services.This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.Security and Cryptology,2946-1863 ;8880Data protectionCryptographyData encryption (Computer science)Computer networksData and Information SecurityCryptologyComputer Communication NetworksData protection.Cryptography.Data encryption (Computer science).Computer networks.Data and Information Security.Cryptology.Computer Communication Networks.005.8Prakash Atuledthttp://id.loc.gov/vocabulary/relators/edtShyamasundar Rudrapatnaedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484083303321Information Systems Security3660336UNINA