My Account Log in

1 option

Information Systems Security and Privacy : Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers / edited by Paolo Mori, Steven Furnell, Olivier Camp.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Mori, Paolo (Computer scientist), editor.
Furnell, Steven, 1970- editor.
Camp, Olivier, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Communications in computer and information science 1865-0929 ; 867.
Communications in Computer and Information Science, 1865-0929 ; 867
Language:
English
Subjects (All):
Computer security.
Systems and Data Security.
Local Subjects:
Systems and Data Security.
Physical Description:
1 online resource (XII, 295 pages) : 78 illustrations.
Edition:
First edition 2018.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.
Contents:
Application Marketplace Malware Detection by User Feedback Analysis
A System for Detecting Targeted Cyber-attacks Using Attack Patterns
A Better Understanding of Machine Learning Malware Misclassification
Situation-aware Access Control for Industrie 4.0
How to Quantify Graph De-anonymization Risks
A Security Pattern Classification Based on Data Integration
Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices
Effcient Detection of Conicts in Data Sharing Agreements
On Using Obligations for Usage Control in Joining of Datasets
Directional Distance-Bounding Identification
An Information Security Management for Socio-Technical Analysis of System Security
An Exploration of Some Security Issues Within the BACnet Protocol
Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors. .
Other Format:
Printed edition:
ISBN:
978-3-319-93354-2
9783319933542
9783319933535
9783319933559
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account