Description |
1 online resource (xii, 199 pages) : illustrations (some color) |
Series |
Communications in computer and information science, 1865-0937 ; 1403 |
|
Communications in computer and information science ; 1403. 1865-0937
|
Contents |
Practical and Provable Secure Vehicular Component Protection Scheme -- NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint -- APHC: Auditable and Privacy Preserving Health QR Code based on Blockchain -- AMLChain: A privacy-preserving distributed ledger supporting anti-money laundering and auditing -- Granularity and Usability in Authorization Policies -- A Two-Fold Study to Investigate Users' Perception of IoT Information Sensitivity Levels and Their Willingness to Share the Information -- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures -- JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating -- Digital Twin Monitoring for Cyber-Physical Access Control -- Improving Host-based Intrusion Detection Using Thread Information -- Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches |
Summary |
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online. |
Notes |
"Due to the COVID-19, EISA 2021 was held online." -- Preface |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed January 26, 2022) |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Computer networks -- Access control
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Meng, Weizhi, 1986- editor.
|
|
Katsikas, Sokratis K., editor.
|
ISBN |
9783030939564 |
|
3030939561 |
|