Normal view MARC view ISBD view

Information Systems Security [electronic resource] : 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings / edited by Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar.

Contributor(s): Badarla, Venkata Ramana [editor.] | Nepal, Surya [editor.] | Shyamasundar, Rudrapatna K [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 13784Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2022Edition: 1st ed. 2022.Description: XXVIII, 273 p. 102 illus., 77 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031236907.Subject(s): Data protection | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity detection; DKS-PKI: a distributed key server architecture for public key infrastructure;generating-set evaluation of bloom filter hardening techniques in private record linkage; etc.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16-20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity detection; DKS-PKI: a distributed key server architecture for public key infrastructure;generating-set evaluation of bloom filter hardening techniques in private record linkage; etc.

There are no comments for this item.

Log in to your account to post a comment.