,

Emerging Information Security and Applications

Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers

Paperback Engels 2022 9783030939557
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.*
The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. 
*Due to the COVID-19 pandemic the conference was held online. 

Specificaties

ISBN13:9783030939557
Taal:Engels
Bindwijze:paperback
Uitgever:Springer International Publishing

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Practical and Provable Secure Vehicular Component Protection Scheme.- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint.- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain.-  AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing.- Granularity and Usability in Authorization Policies.-  A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information.- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating.- Digital Twin Monitoring for Cyber-Physical Access Control.- Improving Host-based Intrusion Detection Using Thread Information.- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Emerging Information Security and Applications