LEADER 04547nam 22007215 450 001 9911046534703321 005 20250721130835.0 010 $a3-031-89518-5 024 7 $a10.1007/978-3-031-89518-0 035 $a(CKB)39698744400041 035 $a(MiAaPQ)EBC32227353 035 $a(Au-PeEL)EBL32227353 035 $a(DE-He213)978-3-031-89518-0 035 $a(OCoLC)1528959154 035 $a(EXLCZ)9939698744400041 100 $a20250721d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security and Privacy $e9th International Conference, ICISSP 2023, Lisbon, Portugal, 22?24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26?28, 2024, Revised Selected Papers /$fedited by Gabriele Lenzini, Paolo Mori, Steven Furnell 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (500 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2459 311 08$a3-031-89517-7 327 $aManagement and Operations -- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection -- Secure Multi-Party Querying Federated Graph Databases -- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty -- Applications and Services -- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs -- Evaluating Input Transformation Ensembles Against Adversarial Attacks -- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks -- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations -- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis -- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map -- Efficient Management Models for SGX Enclaves -- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods -- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication -- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution -- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction -- A Peek into the Ecosystem of TPM v2. 330 $aThis book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2459 606 $aData protection 606 $aComputer networks 606 $aComputer systems 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aArtificial intelligence 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer systems. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aLenzini$b Gabriele$01349777 701 $aMori$b Paolo$070988 701 $aFurnell$b Steven$0846860 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911046534703321 996 $aInformation Systems Security and Privacy$93404724 997 $aUNINA