Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / [electronic resource] :
edited by Atul Prakash, Rudrapatna Shyamasundar.
- 1st ed. 2014.
- XXIV, 478 p. 163 illus. online resource.
- Security and Cryptology, 8880 2946-1863 ; .
- Security and Cryptology, 8880 .
Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services.
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.
9783319138411
10.1007/978-3-319-13841-1 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks .
Data and Information Security.
Cryptology.
Computer Communication Networks.
QA76.9.A25
005.8
Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services.
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.
9783319138411
10.1007/978-3-319-13841-1 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks .
Data and Information Security.
Cryptology.
Computer Communication Networks.
QA76.9.A25
005.8