語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Systems Security and Pri...
~
Mori, Paolo.
Information Systems Security and Privacy = 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information Systems Security and Privacy/ edited by Paolo Mori, Steven Furnell, Olivier Camp.
其他題名:
4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /
其他作者:
Mori, Paolo.
面頁冊數:
XII, 303 p. 137 illus., 75 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-25109-3
ISBN:
9783030251093
Information Systems Security and Privacy = 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /
Information Systems Security and Privacy
4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /[electronic resource] :edited by Paolo Mori, Steven Furnell, Olivier Camp. - 1st ed. 2019. - XII, 303 p. 137 illus., 75 illus. in color.online resource. - Communications in Computer and Information Science,9771865-0929 ;. - Communications in Computer and Information Science,498.
Fine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform -- Touch and Move: Incoming Call User Authentication -- Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS -- A Simple Attack on CaptchaStar -- Notify this: Exploiting Android Notifications for Fun and Profit -- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling -- A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack -- GenVote: Blockchain-based Customizable and Secure Voting Platform -- A Detailed Analysis of the CICIDS2017 Data Set -- Personalising Security Education: Factors Influencing Individual Awareness and Compliance -- Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study -- On Building a Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs -- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction -- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data.
This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.
ISBN: 9783030251093
Standard No.: 10.1007/978-3-030-25109-3doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information Systems Security and Privacy = 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /
LDR
:03500nam a22004095i 4500
001
1006028
003
DE-He213
005
20200629202813.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030251093
$9
978-3-030-25109-3
024
7
$a
10.1007/978-3-030-25109-3
$2
doi
035
$a
978-3-030-25109-3
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Information Systems Security and Privacy
$h
[electronic resource] :
$b
4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /
$c
edited by Paolo Mori, Steven Furnell, Olivier Camp.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XII, 303 p. 137 illus., 75 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
977
505
0
$a
Fine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform -- Touch and Move: Incoming Call User Authentication -- Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS -- A Simple Attack on CaptchaStar -- Notify this: Exploiting Android Notifications for Fun and Profit -- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling -- A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack -- GenVote: Blockchain-based Customizable and Secure Voting Platform -- A Detailed Analysis of the CICIDS2017 Data Set -- Personalising Security Education: Factors Influencing Individual Awareness and Compliance -- Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study -- On Building a Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs -- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction -- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data.
520
$a
This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
650
0
$a
Computer organization.
$3
596298
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Data encryption (Computer science).
$3
1051084
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Cryptology.
$3
1211076
700
1
$a
Mori, Paolo.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1205898
700
1
$a
Furnell, Steven.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
676786
700
1
$a
Camp, Olivier.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
670068
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030251086
776
0 8
$i
Printed edition:
$z
9783030251109
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-3-030-25109-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入