Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings

Author:   Venkata Ramana Badarla ,  Surya Nepal ,  Rudrapatna K. Shyamasundar
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13784
ISBN:  

9783031236891


Pages:   273
Publication Date:   11 December 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ​ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc

Full Product Details

Author:   Venkata Ramana Badarla ,  Surya Nepal ,  Rudrapatna K. Shyamasundar
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13784
Weight:   0.468kg
ISBN:  

9783031236891


ISBN 10:   3031236890
Pages:   273
Publication Date:   11 December 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Ostinato: Cross-host Attack Correlation through Attack Activity SimilarityDetection.-DKS-PKI: A Distributed Key Server Architecture for Public KeyInfrastructure.-Generating-Set Evaluation of Bloom Filter Hardening Techniques in PrivateRecord Linkage.-SHIELD: A Multimodal Deep Learning Framework For Android MalwareDetection.-Samyukta: A Unified Access Control Model using Roles, Labels, andAttributes.-Efficient and Effective Static Android Malware Detection Using MachineLearning.-Attacks on ML Systems: From Security Analysis to Attack Mitigation.-MILSA: Model Interpretation based Label Sniffing Attack in Federated Learning.-IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics.-Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD).-Mining Attribute-Based Access Control Policies.-Preventing Privacy-Violating Information Flows in JavaScript Applications using Dynamic Labelling.-On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems.-WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.-WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.-WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List