LEADER 04681nam 22007695 450 001 9910349293203321 005 20251107152749.0 010 $a3-030-25109-8 024 7 $a10.1007/978-3-030-25109-3 035 $a(CKB)4100000008618247 035 $a(DE-He213)978-3-030-25109-3 035 $a(MiAaPQ)EBC5919015 035 $a(PPN)238489388 035 $a(EXLCZ)994100000008618247 100 $a20190704d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security and Privacy $e4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /$fedited by Paolo Mori, Steven Furnell, Olivier Camp 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XII, 303 p. 137 illus., 75 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v977 311 08$a3-030-25108-X 327 $aFine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform -- Touch and Move: Incoming Call User Authentication -- Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS -- A Simple Attack on CaptchaStar -- Notify this: Exploiting Android Noti?cations for Fun and Pro?t -- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling -- A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack -- GenVote: Blockchain-based Customizable and Secure Voting Platform -- A Detailed Analysis of the CICIDS2017 Data Set -- Personalising Security Education: Factors In?uencing Individual Awareness and Compliance -- Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study -- On Building a Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs -- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction -- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data. 330 $aThis book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v977 606 $aData protection 606 $aComputer networks 606 $aComputer engineering 606 $aComputer networks$xSecurity measures 606 $aComputers 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aMobile and Network Security 606 $aComputing Milieux 606 $aCryptology 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aComputer networks$xSecurity measures. 615 0$aComputers. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aMobile and Network Security. 615 24$aComputing Milieux. 615 24$aCryptology. 676 $a005.8 676 $a005.8 702 $aMori$b Paolo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamp$b Olivier$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349293203321 996 $aInformation Systems Security and Privacy$92162731 997 $aUNINA