Amazon cover image
Image from Amazon.com

Information Systems Security [electronic resource] : 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 13784Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2022Edition: 1st ed. 2022Description: XXVIII, 273 p. 102 illus., 77 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031236907
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources: In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity detection; DKS-PKI: a distributed key server architecture for public key infrastructure;generating-set evaluation of bloom filter hardening techniques in private record linkage; etc.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity detection; DKS-PKI: a distributed key server architecture for public key infrastructure;generating-set evaluation of bloom filter hardening techniques in private record linkage; etc.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in