Description |
1 online resource (xi, 390 pages) : illustrations |
Series |
IFIP Advances in Information and Communication Technology, 1868-4238 ; 562 |
|
IFIP advances in information and communication technology ; 562. 1868-4238
|
Contents |
Intrusion Detection -- Hunting Brand Domain Forgery: A Scalable Classification for Homograph Attack / Tran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota -- GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier / Guanxiong Liu, Issa Khalil, Abdallah Khreishah -- Control Logic Injection Attacks on Industrial Control Systems / Hyunguk Yoo, Irfan Ahmed -- An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications / David Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero -- Access Control -- Performance of Password Guessing Enumerators Under Cracking Conditions / Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars -- An Offline Dictionary Attack Against zkPAKE Protocol / José Becerra, Peter Y.A. Ryan, Petra Šala, Marjan Škrobot -- Fine-Grained Access Control in Industrial Internet of Things / Dominik Ziegler, Josef Sabongui, Gerald Palfinger -- Towards an Automated Extraction of ABAC Constraints from Natural Language Policies / Manar Alohaly, Hassan Takabi, Eduardo Blanco -- Removing Problems in Rule-Based Policies / Zheng Cheng, Jean-Claude Royer, Massimo Tisi -- Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild / Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth -- Organizational and Behavioral Security -- Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data / Lorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger -- ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment / Majid Hatamian, Sebastian Pape, Kai Rannenberg -- SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications / Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou -- The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users / Joëlle Simonet, Stephanie Teufel -- To Be, or Not to Be Notified / Patrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner -- A Structured Comparison of the Corporate Information Security Maturity Level / Michael Schmid, Sebastian Pape -- Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model / Ali Farooq, Debora Jeske, Jouni Isoaho -- Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym / David Harborth, Xinyuan Cai, Sebastian Pape -- Crypto and Encryption -- Arcana: Enabling Private Posts on Public Microblog Platforms / Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo -- Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards / Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny -- BlockTag: Design and Applications of a Tagging System for Blockchain Analysis / Yazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah -- Forward Secure Identity-Based Signature Scheme with RSA / Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh -- Integrity -- On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques / Sarwar Sayeed, Hector Marco-Gisbert -- Automatically Proving Purpose Limitation in Software Architectures / Kai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz et al. -- Commit Signatures for Centralized Version Control Systems / Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos -- Towards Contractual Agreements for Revocation of Online Data / Theodor Schnitzler, Markus Dürmuth, Christina Pöpper |
Summary |
"This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019. The 26 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on intrusion detection, access control, organizational and behavioral, crypto and encryption, and integrity."--Publisher's website |
Notes |
Includes author index |
Bibliography |
Includes bibliographical references |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed July 4, 2019) |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Dhillon, Gurpreet, 1963- editor.
|
|
Karlsson, Frederik, editor
|
|
Hedström, Karin, editor
|
|
Zúquete, André, 1965- editor.
|
ISBN |
9783030223120 |
|
3030223124 |
|
3030223116 |
|
9783030223113 |
|
9783030223137 |
|
3030223132 |
|
9783030223144 |
|
3030223140 |
|