درحال بارگذاري...
جستجو
ایمیل دوست | |
نام شما | |
ایمیل شما | |
کد مقابل را وارد نمایید | |
این صفحه برای دوست شما با موفقیت ارسال شد.
3 مرتبه مشاهده شده
Information Systems Security: 16th International Conference, ICISS 2020 Jammu, India, December 16–20, 2020 Proceedings
Kanhere, Salil
- ISBN:9783030656096
- Main Entry: Kanhere, Salil
- Title:Information Systems Security: 16th International Conference, ICISS 2020 Jammu, India, December 16–20, 2020 Proceedings/ Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur (Eds.).-
- Publisher:Cham, Switzerland: Springer, 2020.
-
محتواي کتاب
- مشاهده
- Preface
- Organization
- Abstracts of Keynote Talks
- On Adversarial Testing of Cellular Network Protocols
- Formalizing Data Deletion in the Context of the Right to be Forgotten
- Insecurity Analysis of the IoT Platforms and Systems
- A Defense Against Trojan Attacks on Deep Neural Networks
- Access Control Convergence: Challenges and Opportunities
- Contents
- Access Control
- A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT
- Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values
- Reliability and Security for Safety-Critical Service Compositions
- AI/ML in Security
- A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks
- An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning
- Machine Learning Based Android Vulnerability Detection: A Roadmap
- Privacy and Web Security
- Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach
- Privacy-Preserving Friend Recommendation in an Integrated Social Environment
- A Toolkit for Security Awareness Training Against Targeted Phishing
- Forensic Source Identification of OSN Compressed Images
- Cryptography
- Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency
- LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX
- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
- Systems Security
- Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information
- Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security
- Detection of Malign and Benign PE Files Using Texture Analysis
- Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
- Author Index