Information Systems Security : 21st International Conference, ICISS 2025, Indore, India, December 16-20, 2025, Proceedings (Lecture Notes in Computer Science 16380) (2026. xx, 420 S. XX, 420 p. 235 mm)

個数:
  • 予約
  • ポイントキャンペーン

Information Systems Security : 21st International Conference, ICISS 2025, Indore, India, December 16-20, 2025, Proceedings (Lecture Notes in Computer Science 16380) (2026. xx, 420 S. XX, 420 p. 235 mm)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 420 p.
  • 言語 ENG
  • 商品コード 9783032137135

Full Description

This book constitutes the refereed proceedings of the 21st International Conference on Information Systems Security, ICISS 2025, held in Indore, India, during December 16-20, 2025.

The 15 full papers and14 short papers included in this volume were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: Access Control; AI for Security; Applied Cryptography; Cyber Security Case Study; Fraud Detection; Intrusion Detection; Malware Detection; Network Security; Privacy; and System Security.

Contents

.-Access Control.
.-An ML-Driven Adaptive Risk-Based Access Control for the Internet of Drones (IoD).
.-Optimizing Machine Learning Based Access Control Administration Through Data Distillation.
.-AI for Security.
.-The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models.
.-Frequency-Aware Deepfake Detection: Transformers vs. CNNs.
.-NEXUS: Neuron Activation Scores Exploits for Unveiling Sensitive Attributes.
.-MazeNet: Protecting DNN Models on Public Cloud Platforms With TEEs.
.-Automation and Risk: Transformers Models Reshape Secrecy Information Management.
.-A Secure Federated Learning using Differential Privacy Mondrian Clustering.
.-Attack Resilient Federated Learning Framework.
.-SANVector: SBERT-APTNet Vector framework for Cyber Threat Attack Attribution using diversified CTI Logs.
.-Applied Cryptography.
.-Cryptanalysis of Two Outsourced Ciphertext-Policy Attribute-Based Encryption Schemes.
.-Dynamic Key-Constant Aggregate Encryption (DKCAE) for Secure Data Sharing in Contemporary Computing.
.-Adversarial Attack on CryptoEyes from INFOCOM 2021.
.-Randomness efficient algorithms for estimating average gate fidelity via k-wise classical and quantum independence.
.-DoPQM: Devices Oriented Post-Quantum Cryptographic Migration Strategies for an Enterprise Network.
.-Cyber Security Case Study.
.-Cyber Warfare During Operation Sindoor: Malware Campaign Analysis and Detection Framework.
.-Fraud Detection.
.-Genetic-LAD: A Hybrid Approach for Financial Fraud Detection.
.-Intrusion Detection.
.-Curriculum Learning with Image Transformation and Explainable AI for Improved Network Intrusion Detection.
.-SAAT: Stealthy Adversarial Attack on IDS in Cyber Physical Systems using Control Logic Induction.
.-Malware Detection.
.-Enhancing Android Malware Detection with Federated Learning: A Privacy-Preserving Approach to Strengthen Cyber Resilience.
.-Network Security.
.- Uncovering Security Weaknesses in srsRAN withCodeQL: A Static Analysis Approach forNext-Gen RAN Systems.
.-Systematic Literature Review of Vulnerabilities and Defenses in VPNs, Tor, and Web Browsers.
.-Security-Centric NWDAF Module for Threat Detection and Mitigation in 5G Core Networks.
.-Privacy.
.-SoK: Evaluation of Methods for Privacy Preserving Edge Video Analytics.
.-Privacy-Preserving Fair Text Summarization Using Federated Learning.
.-System Security.
.-Self Learning Digital Twin For Kubernetes Security.
.-Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications.
.-Adaptive MQTT Honeypots for IIoT Security Using Extended Mealy Machines.
.-Modular Analysis of Attack Graphs for Smart Grid Security.

最近チェックした商品