Limit search to available items
Book Cover
E-book
Author Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (33rd : 2019 : Charleston, S.C.)

Title Data and applications security and privacy XXXIII : 33rd Annual IFIP WG 11.3 Conferences, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, proceedings / Simon N. Foley (Ed.)
Published Cham, Switzerland : Springer, [2019]

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 11559
LNCS Sublibrary: SL3 - Information systems and applications, incl. internet/web, and HCI
Lecture notes in computer science ; 11559.
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Contents [I]. Attacks: Detecting adversarial attacks in the context of Bayesian networks / Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, and Csilla Farkas -- AGBuilder : an AI tool for automated attack graph building, analysis, and refinement / Bruhadeshwar Bezawada, Indrajit Ray, and Kushagra Tiwary -- On practical aspects of PCFG password cracking / Radek Hranický, Filip Lištiak, Dávid Mikuš, and Ondřej Ryšavý -- That's my DNA : detecting malicious tampering of synthesized DNA / Diptendu Mohan Kar and Indrajit Ray
[II]. Mobile and web security: Adversarial sampling attacks against phishing detection / Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson -- Is my phone listening in? On the feasibility and detectability of mobile eavesdropping / Jacob Leon Kröger and Philip Raschke -- Droids in disarray : detecting frame confusion in hybrid Android apps / Davide Caputo, Luca Verderame, Simone Aonzo, and Alessio Merlo
[III]. Privacy: Geo-graph-indistinguishability : protecting location privacy for LBS over road networks / Shun Takagi, Yang Cao, Yasuhito Asano, and Masatoshi Yoshikawa -- "When and where do you want to hide?" : recommendation of location privacy preferences with local differential privacy / Maho Asada, Masatoshi Yoshikawa, and Yang Cao -- Analysis of privacy policies to enhance informed consent / Raúl Pardo and Daniel Le Métayer
[IV]. Security protocol practices: Lost in TLS? No more! Assisted deployment of secure TLS configurations / Salvatore Manfredi, Silvio Ranise, and Giada Sciarretta -- Contributing to current challenges in identity and access management with visual analytics / Alexander Puchta, Fabian Böhm, and Günther Pernul -- Analysis of multi-path Onion routing-based anonymization networks / Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, and Thomas Engel
[V]. Distributed systems: Shoal : query optimization and operator placement for access controlled stream processing systems / Cory Thoma, Alexandros Labrinidis, and Adam J. Lee -- A distributed ledger approach to digital twin secure data sharing / Marietheres Dietz, Benedikt Putz, and Günther Pernul -- Refresh instead of revoke enhances safety and availability : a formal analysis / Mehrnoosh Shakarami and Ravi Sandhu
[VI]. Source code security: Wrangling in the power of code pointers with ProxyCFI / Misiker Tadesse Aga, Colton Holoday, and Todd Austin -- CASFinder : detecting common attack surface / Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, and Anoop Singhal -- Algorithm diversity for resilient systems / Scott D. Stoller and Yanhong A. Liu
[VII]. Malware: Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks / Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu -- Redirecting malware's target selection with decoy processes / Sara Sutton, Garret Michilli, and Julian Rrushi
Summary This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware. -- Provided by publisher
Bibliography Includes bibliographical references and index
Notes Online resource; title from digital title page (viewed on August 02, 2019)
Subject Computer security -- Congresses
Application software -- Congresses
Data protection -- Congresses
Internet -- Security measures -- Congresses
Application software
Computer security
Data protection
Internet -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Foley, Simon N., editor.
ISBN 9783030224790
3030224791
9783030224806
3030224805
Other Titles DBSec 2019