Description |
1 online resource (xii, 303 pages) : illustrations (some color) |
Series |
Communications in Computer and Information Science, 1865-0929 ; 977 |
|
Communications in computer and information science ; 977. 1865-0929
|
Contents |
Fine-grained privacy control for fitness and health applications using the privacy management platform / Christoph Stach -- Touch and move : incoming call user authentication / Aleksandr Eremin, Konstantin Kogos, and Yana Valatskayte -- Elicitation of privacy requirements for the Internet of Things using ACCESSORS / Christoph Stach and Bernhard Mitschang -- A simple attack on CaptchaStar / Thomas Gougeon and Patrick Lacharme -- Notify this : exploiting Android notifications for fun and profit / Efthimios Alepis -- The current state of the holistic privacy and security modelling approach in business process and software architecture modelling / Sascha Alpers, Roman Pilipchuk, Andreas Oberweis, and Ralf Reussner -- A critical security analysis of the password-based authentication Honeywords system using code-corruption attack / Ziya Alper Genç, Gabriele Lenzini, Peter Y.A. Ryan, and Itzel Vazquez Sandoval -- GenVote : blockchain-based customizable and secure voting platform / Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler, and Gaby G. Dagher -- A detailed analysis of the CICIDS2017 data set / Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani -- Personalising security education : factors influencing individual awareness and compliance / Ismini Vasileiou and Steven Furnell |
|
Managing cybersecurity break-ins using Bluetooth low energy devices to verify attackers : a practical study / Kenneth C.K. Wong and Aaron Hunter -- On building a visualisation tool for access control policies / Charles Morisset and David Sanchez -- Survey and guidelines for the design and deployment of a cyber security label for SMEs / Christophe Ponsard and Jeremy Grandclaudon -- Privacy preserving collaborative agglomerative hierarchical clustering construction / Mina Sheikhalishahi, Mona Hamidi, and Fabio Martinelli -- Insights into unsupervised holiday detection from low-resolution smart metering data / Günther Eibl, Sebastian Burkhart, and Dominik Engel |
Summary |
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services. -- Provided by publisher |
Bibliography |
Includes bibliographical references and index |
Notes |
Current copyright fee: GBP19.00 42\0. Uk |
|
Online resource (SpringerLink, viewed August 1, 2019) |
Subject |
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Data protection -- Congresses
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
|
Data protection
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Mori, Paolo, editor
|
|
Furnell, Steven, editor
|
|
Camp, Olivier, editor
|
ISBN |
9783030251093 |
|
3030251098 |
|
303025108X |
|
9783030251086 |
|
9783030251109 |
|
3030251101 |
|