Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II

Author:   Nicky Mouha ,  Nick Nikiforakis
Publisher:   Springer International Publishing AG
Edition:   2024 ed.
Volume:   15258
ISBN:  

9783031757631


Pages:   334
Publication Date:   06 December 2024
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $171.57 Quantity:  
Pre-Order

Share |

Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II


Add your own review!

Overview

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

Full Product Details

Author:   Nicky Mouha ,  Nick Nikiforakis
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2024 ed.
Volume:   15258
ISBN:  

9783031757631


ISBN 10:   3031757637
Pages:   334
Publication Date:   06 December 2024
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Web Security. .- JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript. .- Automated Generation of Behavioral Signatures for Malicious Web Campaigns. .- We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts. .- Intrusion Detection. .- TIDL-IDS: A Time-series Imaging and Deep Learning-based IDS for Connected Autonomous Vehicles. .- FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. .- MVDetector: Malicious vehicles detection under Sybil attacks in VANETs. .- Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List