, ,

Information Systems Security and Privacy

4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers

Paperback Engels 2019 9783030251086
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.
The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

Specificaties

ISBN13:9783030251086
Taal:Engels
Bindwijze:paperback
Uitgever:Springer International Publishing

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Fine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform.-&nbsp;Touch and Move: Incoming Call User Authentication.-&nbsp;Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS.-&nbsp;A Simple Attack on CaptchaStar.-&nbsp;Notify this: Exploiting Android Notifications for Fun and Profit.-&nbsp;The Current State of the Holistic Privacy and Security Modelling&nbsp;Approach in Business Process and Software Architecture Modelling.-&nbsp;A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack.-&nbsp;GenVote: Blockchain-based Customizable and Secure Voting Platform.-&nbsp;A Detailed Analysis of the CICIDS2017 Data Set.-&nbsp;Personalising Security Education: Factors Influencing Individual Awareness and Compliance.-&nbsp;Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study.-&nbsp;On Building a Visualisation Tool for Access Control Policies.-&nbsp;Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs.-&nbsp;Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction.-&nbsp;Insights into Unsupervised Holiday Detection from Low-Resolution<div>Smart Metering Data.</div>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Information Systems Security and Privacy