Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
AISMA-2024 = International Workshop on Advanced Information Security Management and Applications /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
AISMA-2024/ edited by Maria Lapina ... [et al.].
Reminder of title:
International Workshop on Advanced Information Security Management and Applications /
other author:
Lapina, Maria.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Cham :Springer Nature Switzerland : : 2024.,
Description:
xii, 346 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-72171-7
ISBN:
9783031721717
AISMA-2024 = International Workshop on Advanced Information Security Management and Applications /
AISMA-2024
International Workshop on Advanced Information Security Management and Applications /[electronic resource] :edited by Maria Lapina ... [et al.]. - Cham :Springer Nature Switzerland :2024. - xii, 346 p. :ill. (some col.), digital ;24 cm. - Lecture notes in networks and systems,8632367-3389 ;. - Lecture notes in networks and systems ;v.1..
Chapter 1. Technology for assessing the readiness of information security specialists in the system of continuing education using game approaches -- Chapter 2. Access authentication and key distribution using physically unclonable functions, with SHA-256 as an example -- Chapter 3. Development of a framework for describing security incidents -- Chapter 4. Analysing information security risks when remotely connecting to the web interface -- Chapter 5. A safe and secure online system for bidding using blockchain technology -- Chapter 6. Theoretical framework for blockchain secured predictive maintenance learning model using digital twin -- Chapter 7. Advancements in Sybil attack detection: a comprehensive survey of machine learning-based approaches in wireless sensor networks -- Chapter 8. Guaranteed Output Delivery with More than 1/3 of Malicious Corruption for Client Server MPC Protocols and Applications -- Chapter 9. Methods of safe processing of user-entered information in information systems -- Chapter 10. Comparative analysis of methods for assessing confidence in the information security audit process -- Etc.
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process. In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.
ISBN: 9783031721717
Standard No.: 10.1007/978-3-031-72171-7doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / I58 2024
Dewey Class. No.: 005.8
AISMA-2024 = International Workshop on Advanced Information Security Management and Applications /
LDR
:03484nam a2200337 a 4500
001
1138359
003
DE-He213
005
20241016125739.0
006
m d
007
cr nn 008maaau
008
250117s2024 sz s 0 eng d
020
$a
9783031721717
$q
(electronic bk.)
020
$a
9783031721700
$q
(paper)
024
7
$a
10.1007/978-3-031-72171-7
$2
doi
035
$a
978-3-031-72171-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2024
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
AISMA-2024
$h
[electronic resource] :
$b
International Workshop on Advanced Information Security Management and Applications /
$c
edited by Maria Lapina ... [et al.].
260
$a
Cham :
$c
2024.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xii, 346 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
863
505
0
$a
Chapter 1. Technology for assessing the readiness of information security specialists in the system of continuing education using game approaches -- Chapter 2. Access authentication and key distribution using physically unclonable functions, with SHA-256 as an example -- Chapter 3. Development of a framework for describing security incidents -- Chapter 4. Analysing information security risks when remotely connecting to the web interface -- Chapter 5. A safe and secure online system for bidding using blockchain technology -- Chapter 6. Theoretical framework for blockchain secured predictive maintenance learning model using digital twin -- Chapter 7. Advancements in Sybil attack detection: a comprehensive survey of machine learning-based approaches in wireless sensor networks -- Chapter 8. Guaranteed Output Delivery with More than 1/3 of Malicious Corruption for Client Server MPC Protocols and Applications -- Chapter 9. Methods of safe processing of user-entered information in information systems -- Chapter 10. Comparative analysis of methods for assessing confidence in the information security audit process -- Etc.
520
$a
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process. In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computer networks
$x
Access control
$v
Congresses.
$3
770750
650
1 4
$a
Data Engineering.
$3
1226308
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
700
1
$a
Lapina, Maria.
$3
1462048
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-3-031-72171-7
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login