Emerging Information Security and Applications : Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Communications in Computer and Information Science)

個数:

Emerging Information Security and Applications : Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Communications in Computer and Information Science)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 199 p.
  • 商品コード 9783030939557

Full Description

This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.*
The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. 
*Due to the COVID-19 pandemic the conference was held online. 

Contents

Practical and Provable Secure Vehicular Component Protection Scheme.- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint.- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain.-  AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing.- Granularity and Usability in Authorization Policies.-  A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information.- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating.- Digital Twin Monitoring for Cyber-Physical Access Control.- Improving Host-based Intrusion Detection Using Thread Information.- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.

最近チェックした商品