Information Systems Security and Privacy: 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22–24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26–28, 2024, Revised Selected Papers

Author:   Gabriele Lenzini ,  Paolo Mori ,  Steven Furnell
Publisher:   Springer International Publishing AG
Volume:   2459
ISBN:  

9783031895173


Pages:   329
Publication Date:   24 June 2025
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $316.77 Quantity:  
Pre-Order

Share |

Information Systems Security and Privacy: 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22–24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26–28, 2024, Revised Selected Papers


Add your own review!

Overview

This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.

Full Product Details

Author:   Gabriele Lenzini ,  Paolo Mori ,  Steven Furnell
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   2459
ISBN:  

9783031895173


ISBN 10:   3031895177
Pages:   329
Publication Date:   24 June 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

Management and Operations.- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection.- Secure Multi-Party Querying Federated Graph Databases.- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty.- Applications and Services.- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs.- Evaluating Input Transformation Ensembles Against Adversarial Attacks.- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks.- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations.- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis.- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.- Efficient Management Models for SGX Enclaves.- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods.- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication.- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution.- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction.- A Peek into the Ecosystem of TPM v2.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List