LEADER 01282nam0-2200445---450- 001 990000052780203316 005 20060203104722.0 010 $a88-374-1214-2 035 $a0005278 035 $aUSA010005278 035 $a(ALEPH)000005278USA01 035 $a0005278 100 $a20000914d1991----|||y0itay0103----ba 101 0 $aita 102 $ait 105 $aa---||||001|y 200 1 $aRiccardo Benvenuti$ftesto di Paolo Levi 210 $aMilano$cG. Mondadori & associati$dcopyr. 1991 676 $a759.06 700 1$aBENVENUTI,$bRiccardo$0746137 702 1$aLEVI,$bPaolo 801 $aIT$bSALBC$gISBD 912 $a990000052780203316 951 $aXII.2.C. 990(VII P 444)$b150054 L.M.$cVII P$dY 959 $aBK 979 $c20000914$lUSA01$h1723 979 $c20001019$lUSA01$h1055 979 $c20001019$lUSA01$h1452 979 $c20001019$lUSA01$h1500 979 $c20001019$lUSA01$h1537 979 $c20001024$lUSA01$h1513 979 $c20001027$lUSA01$h1522 979 $c20001110$lUSA01$h1709 979 $c20001124$lUSA01$h1206 979 $c20020403$lUSA01$h1612 979 $aPATRY$b90$c20040406$lUSA01$h1605 979 $aCOPAT5$b90$c20060203$lUSA01$h1047 996 $aRiccardo Benvenuti$91488870 997 $aUNISA bas $auma LEADER 04930nam 22006135 450 001 996635664203316 005 20241214115304.0 010 $a9783031800207 010 $a3031800206 024 7 $a10.1007/978-3-031-80020-7 035 $a(MiAaPQ)EBC31838464 035 $a(Au-PeEL)EBL31838464 035 $a(CKB)37018243500041 035 $a(DE-He213)978-3-031-80020-7 035 $a(EXLCZ)9937018243500041 100 $a20241214d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security $e20th International Conference, ICISS 2024, Jaipur, India, December 16?20, 2024, Proceedings /$fedited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (501 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15416 311 08$a9783031800191 311 08$a3031800192 327 $a -- System Security. -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions. -- S-RFUP: Secure Remote Firmware Update Protocol. -- Securing Virtual Reality Apps Inter-Process Communication. -- Network Security. -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol. -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data. -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI. -- QIris: Quantum Implementation of Rainbow Table Attacks. -- Malware and Vulnerability Detection. -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs. -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation. -- Privacy & Usability. -- Web Privacy Perceptions Amongst Indian Users. -- Enabling Privacy in IT Service Operations. -- Privacy-Preserving Photo Sharing: An SSI Use Case. -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. -- A Decoupling Mechanism for Transaction Privacy. -- AI Security. -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs. -- MALAI: ML-based Attack on Learning With Error problem. -- Patch based backdoor attack on Deep Neural Networks. -- Industry Demo/Practice. -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting. -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR). -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network. 330 $aThis book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16?20, 2024. The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15416 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aPatil$b Vishwas T$01782637 701 $aKrishnan$b Ram$0973990 701 $aShyamasundar$b Rudrapatna K$01782638 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996635664203316 996 $aInformation Systems Security$94309036 997 $aUNISA