ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings

دانلود کتاب امنیت سیستم های اطلاعاتی: شانزدهمین کنفرانس بین المللی ، ICISS 2020 ، جامو ، هند ، 16-20 دسامبر ، 2020 ، مجموعه مقالات

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings

مشخصات کتاب

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings

ویرایش: 1st ed. 
نویسندگان: , , ,   
سری: Lecture Notes in Computer Science 12553 
ISBN (شابک) : 9783030656096, 9783030656102 
ناشر: Springer International Publishing;Springer 
سال نشر: 2020 
تعداد صفحات: 297 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 29 مگابایت 

قیمت کتاب (تومان) : 52,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 18


در صورت تبدیل فایل کتاب Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب امنیت سیستم های اطلاعاتی: شانزدهمین کنفرانس بین المللی ، ICISS 2020 ، جامو ، هند ، 16-20 دسامبر ، 2020 ، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب امنیت سیستم های اطلاعاتی: شانزدهمین کنفرانس بین المللی ، ICISS 2020 ، جامو ، هند ، 16-20 دسامبر ، 2020 ، مجموعه مقالات



این کتاب مجموعه مقالات شانزدهمین کنفرانس بین‌المللی امنیت سیستم‌های اطلاعات، ICISS 2020 است که در جامو، هند، طی 16 تا 20 دسامبر 2020 برگزار شد.

11 مقاله معمولی، 2 مقاله کوتاه و 3 کار- مقالات در حال انجام موجود در این جلد به دقت بررسی و از بین 53 مقاله ارسالی انتخاب شدند. مقالات در بخش های موضوعی با نام های: کنترل دسترسی سازماندهی شدند. AI/ML در امنیت؛ حریم خصوصی و امنیت وب؛ رمزنگاری؛ و امنیت سیستم ها


توضیحاتی درمورد کتاب به خارجی

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.

The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.



فهرست مطالب

Preface
Organization
Abstracts of Keynote Talks
On Adversarial Testing of Cellular Network Protocols
Formalizing Data Deletion in the Context of the Right to be Forgotten
Insecurity Analysis of the IoT Platforms and Systems
A Defense Against Trojan Attacks on Deep Neural Networks
Access Control Convergence: Challenges and Opportunities
Contents
Access Control
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT
	1 Introduction
	2 Calibration Traceability and Access Control: A Case for Unification
		2.1 Information Flow Constraints
		2.2 Existing Access Control Models and Calibration Traceability
	3 A Unified Access Control Model for Calibration Traceability
	4 Evaluation
		4.1 Case Example: Calibration Traceability for a Sensor Device
		4.2 Performance Evaluation
	5 Discussion and Limitations
	6 Related Work
	7 Conclusion
	References
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values
	1 Introduction
	2 Learning Three-Valued Logic Formulas
		2.1 Problem Definition
		2.2 Learning a Multi-way Decision Tree
		2.3 Algorithm for Learning a Three-Valued Logic Formula
	3 Policy Language with Unknown Attribute Values
	4 The Problem: ReBAC Policy Mining with Unknowns
	5 ReBAC Policy Mining Algorithm
		5.1 Phase 1: Learn Decision Tree and Extract Rules
		5.2 Phase 2: Improve the Rules
	6 Evaluation Methodology
		6.1 Datasets
		6.2 Policy Similarity Metrics
	7 Evaluation Results
		7.1 Comparison with DTRM and DTRM-
		7.2 Experiments with Unknown Attribute Values
	8 Related Work
	References
Reliability and Security for Safety-Critical Service Compositions
	1 Introduction
	2 Background
		2.1 Secure Multiparty Computation
		2.2 Secret Sharing
		2.3 Threshold Signatures
	3 System Model
		3.1 Security Objectives
		3.2 Actors and Data Flow
		3.3 Creation of a Validator Subnet
	4 Reliable Service Composition Protocol
	5 Evaluation
		5.1 Case Study
		5.2 Implementation
		5.3 Performance
		5.4 Discussion and Future Work
	6 Related Work
	7 Conclusion
	References
AI/ML in Security
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks
	1 Introduction
	2 Backdoor Attacks
	3 A Plug-In Backdoor Defense: STRIP
		3.1 Overview
		3.2 Results
		3.3 Experimental Setup
		3.4 MNIST
		3.5 CIFAR10
		3.6 Discussion
	4 Conclusion
	References
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning
	1 Introduction
	2 Overview of Cyber Threat Intelligence
	3 GAP Identified
	4 Role of AI and ML in CTI Platform
	5 Proposed Model for Using AI and ML with Cyber Threat Intelligence Domain
		5.1 Outline of the Proposed Model
		5.2 Data Accumulation
		5.3 Feature Extraction and Language Processing
		5.4 Machine Learning Classifier
		5.5 Performance of the Proposed Model
	6 Future Scope of the Proposed Model
	7 Conclusion
	References
Machine Learning Based Android Vulnerability Detection: A Roadmap
	1 Introduction
	2 Related Work
	3 Data Extraction Methodology
	4 Android Vulnerability Trend
	5 Discussions and Future Directions
	6 Conclusion
	References
Privacy and Web Security
Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach
	1 Introduction
	2 Automatic Captcha Solver
		2.1 Captcha Characteristics
		2.2 Captcha Training
		2.3 Captcha Solving
	3 Experiments
		3.1 CNN Based Approach
		3.2 Results
		3.3 Design Recommendations
	4 Related Work
	5 Conclusion
	References
Privacy-Preserving Friend Recommendation in an Integrated Social Environment
	1 Introduction
		1.1 Problem Definition
		1.2 Problem Relevance
		1.3 Adversary Model and Protocol Overview
	2 Preliminaries
		2.1 Friend Recommendation Based on Mutual Friends
		2.2 Differential Privacy (DP)
	3 The Proposed Protocol
		3.1 Protocol Initialization
		3.2 The Main Protocol
		3.3 Security Analysis
		3.4 Complexity Analysis
	4 Experimental Results
		4.1 Experimental Setup
		4.2 Empirical Analysis
	5 Related Work
	6 Conclusion
	References
A Toolkit for Security Awareness Training Against Targeted Phishing
	1 Introduction
	2 Background and Related Work
		2.1 Security Awareness Training
		2.2 Targeted Phishing
		2.3 Existing Tooling for (targeted) Phishing Simulations
		2.4 Discussion
	3 Proposed Framework and Implementation
		3.1 Email Customization
		3.2 Domain Selection
	4 A Case Study Application to Oliveira et al.
		4.1 Scenario Limitation of Previous Studies and Research Gap
		4.2 Improved Experiment Design
		4.3 Discussion
	5 Conclusion
	A Phishing Email Templates
		A.1 Liking and Security Template
		A.2 Reciprocation and Social Template
	References
Forensic Source Identification of OSN Compressed Images
	1 Introduction
	2 Proposed Deep Learning Model for Source Camera Identification of OSN Compressed Images
		2.1 Network Architecture
		2.2 Network Parameters
	3 Experiments, Results and Discussion
		3.1 Experimental Setup
		3.2 Performance Evaluation
		3.3 Comparison
	4 Conclusion and Future Work
	References
Cryptography
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency
	1 Introduction
		1.1 Our Contribution
	2 Preliminaries
		2.1 Ramp Secret Sharing
		2.2 Cheating Model
	3 Ramp Secret Sharing with Cheating Detection
		3.1 Construction - I
		3.2 Construction - II
		3.3 Few Words on Share Size
	4 Conclusion
	References
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX
	1 Introduction
	2 Lightweight Cryptography
		2.1 General Characteristics
		2.2 Existing Designs
	3 ARX
		3.1 Current Scenario
	4 Cipher Design Strategies
		4.1 Wide Trail Strategy (WTS)
		4.2 Long Trail Strategy (LTS)
	5 The LiARX Cipher
		5.1 MARX-2
		5.2 Linear Layer
		5.3 Key Schedule
	6 Experiments
		6.1 Performance Metrics
		6.2 Scenarios
		6.3 Results
	7 Conclusion
	References
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
	1 Introduction
		1.1 Related Works
		1.2 Our Contribution
	2 Prerequisites
		2.1 The Color Model
		2.2 Color Visual Cryptographic Scheme
		2.3 Some Mathematical Results
	3 Main Results
		3.1 Constructing Color VCS from Smaller Schemes
		3.2 Construction of (n,n)c-CVCS
		3.3 Construction of (2,n)c-CVCS
		3.4 Construction of (k,n)c-CVCS
		3.5 Modification of the Technique
	4 Discussions and Experimental Results
		4.1 Comparison
	5 Conclusion
	References
Systems Security
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information
	1 Introduction
		1.1 Background
		1.2 Communication Types and Security
		1.3 Our Purpose
	2 Preliminaries
		2.1 W-OTS+
		2.2 HMAC
	3 Proposed Method
		3.1 Preparation Phase
		3.2 Commitment Phase
		3.3 Verification Phase
	4 Effectiveness in Practical Operations
		4.1 Accuracy and Computational Cost
		4.2 Influence of Size of Entropy
		4.3 How to Determine the Value of wi
	5 Example Calculation
		5.1 Procedure
		5.2 Evaluation of Efficiency
	6 Security Evaluations
		6.1 Threat Scenario
		6.2 Inverse Calculation of Position Information of Player
		6.3 Forgery Attack of Commitment
		6.4 Impersonation Attack of Player/Verifier
		6.5 Importance of Random Element r
	7 Conclusions
	References
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security
	1 Introduction
	2 Literature Survey
	3 Android and Camera Subsystem Security
		3.1 Android\'s Camera Architecture
		3.2 Android Camera\'s Security Mechanisms
	4 Circumventing Android\'s Camera Security
		4.1 Granting Critical Permissions Without Prompting User
		4.2 Capture Picture from Background
		4.3 Disabling Logs
	5 Conclusions
	References
Detection of Malign and Benign PE Files Using Texture Analysis
	1 Introduction
	2 Related Work
	3 PE File Format
	4 Method Proposed
	5 Experiment and Results
	6 Conclusion
	References
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
	1 Introduction
	2 Costs of Cybersecurity
	3 Related Work
	4 Method Description
	5 Case Study
		5.1 Input Data
		5.2 Results
	6 Comparative Analysis with SQUARE
		6.1 Input Data
		6.2 Results Obtained with CAsPeA
		6.3 Results Obtained with SQUARE
		6.4 Results Analysis
	7 Conclusions
	References
Author Index




نظرات کاربران