語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
AISMA-2024 = International Workshop on Advanced Information Security Management and Applications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
AISMA-2024/ edited by Maria Lapina ... [et al.].
其他題名:
International Workshop on Advanced Information Security Management and Applications /
其他作者:
Lapina, Maria.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xii, 346 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-3-031-72171-7
ISBN:
9783031721717
AISMA-2024 = International Workshop on Advanced Information Security Management and Applications /
AISMA-2024
International Workshop on Advanced Information Security Management and Applications /[electronic resource] :edited by Maria Lapina ... [et al.]. - Cham :Springer Nature Switzerland :2024. - xii, 346 p. :ill. (some col.), digital ;24 cm. - Lecture notes in networks and systems,8632367-3389 ;. - Lecture notes in networks and systems ;v.1..
Chapter 1. Technology for assessing the readiness of information security specialists in the system of continuing education using game approaches -- Chapter 2. Access authentication and key distribution using physically unclonable functions, with SHA-256 as an example -- Chapter 3. Development of a framework for describing security incidents -- Chapter 4. Analysing information security risks when remotely connecting to the web interface -- Chapter 5. A safe and secure online system for bidding using blockchain technology -- Chapter 6. Theoretical framework for blockchain secured predictive maintenance learning model using digital twin -- Chapter 7. Advancements in Sybil attack detection: a comprehensive survey of machine learning-based approaches in wireless sensor networks -- Chapter 8. Guaranteed Output Delivery with More than 1/3 of Malicious Corruption for Client Server MPC Protocols and Applications -- Chapter 9. Methods of safe processing of user-entered information in information systems -- Chapter 10. Comparative analysis of methods for assessing confidence in the information security audit process -- Etc.
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process. In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.
ISBN: 9783031721717
Standard No.: 10.1007/978-3-031-72171-7doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.9.A25 / I58 2024
Dewey Class. No.: 005.8
AISMA-2024 = International Workshop on Advanced Information Security Management and Applications /
LDR
:03484nam a2200337 a 4500
001
1138359
003
DE-He213
005
20241016125739.0
006
m d
007
cr nn 008maaau
008
250117s2024 sz s 0 eng d
020
$a
9783031721717
$q
(electronic bk.)
020
$a
9783031721700
$q
(paper)
024
7
$a
10.1007/978-3-031-72171-7
$2
doi
035
$a
978-3-031-72171-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2024
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
AISMA-2024
$h
[electronic resource] :
$b
International Workshop on Advanced Information Security Management and Applications /
$c
edited by Maria Lapina ... [et al.].
260
$a
Cham :
$c
2024.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xii, 346 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
863
505
0
$a
Chapter 1. Technology for assessing the readiness of information security specialists in the system of continuing education using game approaches -- Chapter 2. Access authentication and key distribution using physically unclonable functions, with SHA-256 as an example -- Chapter 3. Development of a framework for describing security incidents -- Chapter 4. Analysing information security risks when remotely connecting to the web interface -- Chapter 5. A safe and secure online system for bidding using blockchain technology -- Chapter 6. Theoretical framework for blockchain secured predictive maintenance learning model using digital twin -- Chapter 7. Advancements in Sybil attack detection: a comprehensive survey of machine learning-based approaches in wireless sensor networks -- Chapter 8. Guaranteed Output Delivery with More than 1/3 of Malicious Corruption for Client Server MPC Protocols and Applications -- Chapter 9. Methods of safe processing of user-entered information in information systems -- Chapter 10. Comparative analysis of methods for assessing confidence in the information security audit process -- Etc.
520
$a
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process. In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Computational Intelligence.
$3
768837
650
1 4
$a
Data Engineering.
$3
1226308
650
0
$a
Computer networks
$x
Access control
$v
Congresses.
$3
770750
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
700
1
$a
Lapina, Maria.
$3
1462048
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-3-031-72171-7
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入