Description |
1 online resource (xi, 327 pages) : illustrations |
Series |
Lecture notes in computer science ; 11161 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 11161.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Cybersecurity ; Who is reusing stolen passwords? an empirical study on stolen passwords and countermeasures / Chedy Missaoui, Safa Bachouch, Ibrahim Abdelkader, and Slim Trabelsi -- A survey of keylogger and screenlogger attacks in the banking sector and countermeasures to them / Hugo Sbai, Michael Goldsmith, Samy Meftali, and Jassim Happa -- Classification of malware families based on runtime behaviour / Munir Geden and Jassim Happa -- Botnet detection in software defined networks by deep learning techniques / Ivan Letteri, Giuseppe Della Penna, and Giovanni De Gasperis -- A bio-inspired approach to attack graphs analysis / Vincenzo Conti, Simone Sante Ruffo, Alessio Merlo, Mauro Migliardi, and Salvatore Vitabile -- Confidence curve for continuous authentication / Tony Quertier -- SCADA security : concepts and recommendations / Dragos Ionica, Florin Pop, Nirvana Popescu, Decebal Popescu, and Ciprian Dobre -- Towards the evaluation of end-to-end resilience through external consistency / Thomas Cľdel, Simon N. Foley, Nora Cuppens, Fřďric Cuppens, Yvon Kermarrec, Fřďric Dubois, Youssef Laarouchi, and Ǧrard Le Comte -- Optimal partitioning of LLC in CAT-enabled CPUs to prevent side-channel attacks / Ugo Fiore, Adrian Florea, Arpad Gellert, Lucian Vintan, and Paolo Zanetti -- GER-EN-GNSS error reduction using an elastic network based on V2V and LiDAR / Walter Balzano and Fabio Vitale -- A dynamic security policies generation model for access control in smart card based applications / B. B. Gupta and Megha Quamara -- An advanced methodology to analyse data stored on mobile devices / Flora Amato, Giovanni Cozzolino, Antonino Mazzeo, and Francesco Moscato -- |
|
Cryptography, data security and biometric techniques ; On the equivalence of 2-threshold secret sharing schemes and prefix codes / Paolo D'Arco, Roberto De Prisco, and Alfredo De Santis -- An efficient and reliable two-level lightweight authentication protocol / Paolo D'Arco, Roberto De Prisco, and Angel Perez del Pozo -- Selective all-or-nothing transform : protecting outsourced data against key exposure / Katarzyna Kapusta and Gerard Memmi -- Light blockchain communication protocol for secure data transfer integrity / Jakub Guziur, Michał Pawlak, Aneta Poniszewska-Marańda, and Bartosz Wieczorek -- Towards the blockchain technology for system voting process / Michał Pawlak, Jakub Guziur, and Aneta Poniszewska-Marańda -- Privacy-preserving SAT solving based on projection-equivalence CNF obfuscation / Ying Qin, Xiao Yang Shen, and Zhen Yue Du -- A fragile watermarking and bilinear fuzzy equations / Ferdinando Di Martino and Salvatore Sessa -- Privacy preserving biometric identification on the bitcoin blockchain / Neyire Deniz Sarier -- Iris quality assessment : a statistical approach for biometric security applications / Andrea F. Abate, Silvio Barra, Andrea Casanova, Gianni Fenu, and Mirko Marras -- |
|
Social security, ontologies and smart applications ; Enhancing information security culture to reduce information security cost : a proposed framework / S.G. Govender, M. Loock, and E. Kritzinger -- Chatbot : an education support system for student / Fabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, and Domenico Santaniello -- A multilevel graph approach for road accidents data interpretation / Fabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, and Domenico Santaniello -- Cyber safety awareness and culture planning in South Africa / E. Kritzinger, M. Loock, and E.N. Mwim |
Summary |
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions. The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographical references at chapter ends, and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed October 31, 2018) |
Subject |
Computer security -- Congresses
|
|
Internet -- Security measures -- Congresses
|
|
Ethical & social aspects of IT.
|
|
Information retrieval.
|
|
Artificial intelligence.
|
|
Data encryption.
|
|
Legal aspects of IT.
|
|
Computer security.
|
|
Computers -- Social Aspects -- General.
|
|
Computers -- Information Technology.
|
|
Computers -- Intelligence (AI) & Semantics.
|
|
Computers -- Security -- General.
|
|
Law -- Science & Technology.
|
|
Computer security
|
|
Internet -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Castiglione, Arcangelo, editor.
|
|
Pop, Florin, editor.
|
|
Ficco, Massimo, editor.
|
|
Palmieri, Francesco., editor
|
ISBN |
9783030016890 |
|
3030016897 |
|
3030016889 |
|
9783030016883 |
|
9783030016906 |
|
3030016900 |
|