Information Systems Security and Privacy: Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers

Author:   Paolo Mori ,  Steven Furnell ,  Olivier Camp
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   867
ISBN:  

9783319933535


Pages:   295
Publication Date:   09 June 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Information Systems Security and Privacy: Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers


Add your own review!

Overview

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.

Full Product Details

Author:   Paolo Mori ,  Steven Furnell ,  Olivier Camp
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   867
Weight:   0.474kg
ISBN:  

9783319933535


ISBN 10:   3319933531
Pages:   295
Publication Date:   09 June 2018
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Application Marketplace Malware Detection by User Feedback Analysis.- A System for Detecting Targeted Cyber-attacks Using Attack Patterns.- A Better Understanding of Machine Learning Malware Misclassification.- Situation-aware Access Control for Industrie 4.0.- How to Quantify Graph De-anonymization Risks.- A Security Pattern Classification Based on Data Integration.- Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices.- Effcient Detection of Conicts in Data Sharing Agreements.- On Using Obligations for Usage Control in Joining of Datasets.- Directional Distance-Bounding Identification.- An Information Security Management for Socio-Technical Analysis of System Security.- An Exploration of Some Security Issues Within the BACnet Protocol.- Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List