Amazon cover image
Image from Amazon.com

Risks and Security of Internet and Systems [electronic resource] : 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Information Systems and Applications, incl. Internet/Web, and HCI ; 9572Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016Description: X, 307 p. 72 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319318110
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Addressing Privacy and Trust Issues in Cultural Heritage Modelling -- An Ontology Regulating Privacy Oriented Access Controls -- A Literature Survey and Classifications on Data Deanonymisation -- Improving Users’ Trust through Friendly Privacy Policies: An Empirical Study -- MPLS Policy Target Recognition Network -- Context aware Intrusion Response Based on Argumentation Logic -- Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management -- Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security -- Exploring a Controls-Based Assessment of Infrastructure Vulnerability -- Quantifying Security in Web ETL Processes -- A Meta-Model for Assisting a Cloud Forensics Process -- POR-2P: Network Coding-Based POR for Data Provision-Payment System -- A Single Key Scheduling Based Compression Function -- Security Issue of Wireless HART Based SCADA Systems -- Attack Volume Model: Geometrical Approach and Application -- An Intensive Analysis of Security and Privacy Browser Add-Ons -- MBotCS: A mobile Botnet Detection System Based on Machine Learning -- Toward Securing MANET against the Energy Depletion Attack. .
In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Addressing Privacy and Trust Issues in Cultural Heritage Modelling -- An Ontology Regulating Privacy Oriented Access Controls -- A Literature Survey and Classifications on Data Deanonymisation -- Improving Users’ Trust through Friendly Privacy Policies: An Empirical Study -- MPLS Policy Target Recognition Network -- Context aware Intrusion Response Based on Argumentation Logic -- Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management -- Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security -- Exploring a Controls-Based Assessment of Infrastructure Vulnerability -- Quantifying Security in Web ETL Processes -- A Meta-Model for Assisting a Cloud Forensics Process -- POR-2P: Network Coding-Based POR for Data Provision-Payment System -- A Single Key Scheduling Based Compression Function -- Security Issue of Wireless HART Based SCADA Systems -- Attack Volume Model: Geometrical Approach and Application -- An Intensive Analysis of Security and Privacy Browser Add-Ons -- MBotCS: A mobile Botnet Detection System Based on Machine Learning -- Toward Securing MANET against the Energy Depletion Attack. .

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in