LEADER 03977nam 22006375 450 001 9910447250703321 005 20251225190550.0 010 $a3-030-65610-1 024 7 $a10.1007/978-3-030-65610-2 035 $a(CKB)4100000011643583 035 $a(DE-He213)978-3-030-65610-2 035 $a(MiAaPQ)EBC6421137 035 $a(PPN)252514661 035 $a(EXLCZ)994100000011643583 100 $a20201205d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security $e16th International Conference, ICISS 2020, Jammu, India, December 16?20, 2020, Proceedings /$fedited by Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XX, 289 p. 83 illus., 56 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12553 311 08$a3-030-65609-8 327 $aAccess Control -- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT -- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against Trojan Attacks on Deep Neural Networks -- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning -- Machine Learning based Android Vulnerability Detection: A Roadmap -- Privacy and Web Security -- Revelio: A Lightweight Captcha Solver using a Dictionary based Approach -- Privacy-Preserving Friend Recommendation in an Integrated Social Environment -- A Toolkit for Security Awareness Training against Targeted Phishing -- Forensic Source Identification of OSN Compressed Images -- Cryptography -- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency -- LiARX: A Lightweight Cipher based on the LTS DesignStrategy of ARX -- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings -- Systems Security -- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information -- Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security -- Detection of Malign and Benign PE Files Using Texture Analysis -- Estimating the Cost of Cybersecurity Activities with CAsPeA. 330 $aThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12553 606 $aData protection 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aComputers 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aComputing Milieux 615 0$aData protection. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputers. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aComputing Milieux. 676 $a005.8 702 $aKanhere$b Salil 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910447250703321 996 $aInformation Systems Security$93660336 997 $aUNINA