Normal view MARC view ISBD view

Information Systems Security [electronic resource] : 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings / edited by Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan.

Contributor(s): Tripathy, Somanath [editor.] | Shyamasundar, Rudrapatna K [editor.] | Ranjan, Rajiv [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 13146Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021.Description: XVIII, 237 p. 58 illus., 52 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030925710.Subject(s): Data protection | Computer networks  | Computer engineering | Data and Information Security | Computer Communication Networks | Computer Engineering and NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.

There are no comments for this item.

Log in to your account to post a comment.