Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings (Lecture Notes in Computer Science)

個数:

Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings (Lecture Notes in Computer Science)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 474 p.
  • 言語 ENG
  • 商品コード 9783031800191

Full Description

This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024.

The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.

Contents

.- System Security.

.- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.

.- An OS support for Tamper-resistant Software Execution Using Empty Interruptions.

.- S-RFUP: Secure Remote Firmware Update Protocol.

.- Securing Virtual Reality Apps Inter-Process Communication.

.- Network Security.

.- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites.

.- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.

.- BP-MAP: A Secure and Convenient Mutual Authentication Protocol.

.- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection.

.- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF).

.- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data.

.- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI.

.- QIris: Quantum Implementation of Rainbow Table Attacks.

.- Malware and Vulnerability Detection.

.- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories.

.- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs.

.- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation.

.- Privacy & Usability.

.- Web Privacy Perceptions Amongst Indian Users.

.- Enabling Privacy in IT Service Operations.

.- Privacy-Preserving Photo Sharing: An SSI Use Case.

.- Zone Recovery Attack on a Secure  Privacy-Preserving Ride-Matching Protocol.

.- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness.

.- A Decoupling Mechanism for Transaction Privacy.

.- AI Security.

.- Protecting ownership of trained DNN models with Zero-Knowledge Proofs.

.- MALAI: ML-based Attack on Learning With Error problem.

.- Patch based backdoor attack on Deep Neural Networks.

.- Industry Demo/Practice.

.- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy.

.- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting.

.- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR).

.- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.

最近チェックした商品