|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations. Full Product DetailsAuthor: Gabriele Lenzini , Paolo Mori , Steven FurnellPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Volume: 2459 ISBN: 9783031895173ISBN 10: 3031895177 Pages: 329 Publication Date: 24 June 2025 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available ![]() This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of ContentsManagement and Operations.- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection.- Secure Multi-Party Querying Federated Graph Databases.- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty.- Applications and Services.- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs.- Evaluating Input Transformation Ensembles Against Adversarial Attacks.- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks.- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations.- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis.- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.- Efficient Management Models for SGX Enclaves.- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods.- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication.- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution.- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction.- A Peek into the Ecosystem of TPM v2.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |