Narrow your search

Library

AP (2)

KDG (2)

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (3)

digital (2)


Language

English (5)


Year
From To Submit

2014 (2)

2009 (3)

Listing 1 - 5 of 5
Sort by

Book
Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
Authors: ---
ISBN: 3319138405 3319138413 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.


Digital
Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings
Authors: ---
ISBN: 9783319138411 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.


Digital
Information Systems Security : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Authors: ---
ISBN: 9783642107726 Year: 2009 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Book
Information systems security : 5th international conference, ICISS 2009, Kolkata, India, December 14-18, 2009 ; proceedings
Authors: --- --- ---
ISBN: 3642107710 3642107729 Year: 2009 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.

Keywords

Computer security --- Information networks --- Computers --- Computer Science --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Automated information networks --- Networks, Information --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Biometrics (Biology). --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Biometrics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Protection --- Security measures --- Distributed processing --- Information services --- Information storage and retrieval systems --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Information Systems Security : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Authors: --- ---
ISBN: 9783642107726 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009. The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.

Listing 1 - 5 of 5
Sort by