Advertisement

© 2020

Information and Communications Security

21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers

  • Jianying Zhou
  • Xiapu Luo
  • Qingni Shen
  • Zhen Xu
Conference proceedings ICICS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11999)

Also part of the Security and Cryptology book sub series (LNSC, volume 11999)

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Malware Analysis and Detection

    1. Front Matter
      Pages 1-1
    2. Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng
      Pages 3-17
    3. Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla
      Pages 18-33
    4. Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun
      Pages 34-50
  3. IoT and CPS Security

    1. Front Matter
      Pages 51-51
    2. Maged Abdelaty, Roberto Doriguzzi-Corin, Domenico Siracusa
      Pages 53-70
    3. Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun
      Pages 71-88
    4. WeiPeng Jiang, Bin Wu, Zhou Jiang, ShaoBo Yang
      Pages 89-104
    5. Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang
      Pages 124-142
  4. Enterprise Network Security

  5. Software Security

    1. Front Matter
      Pages 197-197
    2. Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
      Pages 219-232
    3. Qiu Chen, Danping Shi, Siwei Sun, Lei Hu
      Pages 233-247
  6. System Security

    1. Front Matter
      Pages 249-249

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.

Keywords

artificial intelligence authentication communication systems computer crime computer networks computer security computer systems cryptography data communication systems data security engineering internet machine learning mathematics network protocols network security signal processing telecommunication networks telecommunication systems wireless telecommunication systems

Editors and affiliations

  1. 1.Singapore University of Technology and DesignSingaporeSingapore
  2. 2.The Hong Kong Polytechnic UniversityKowloonHong Kong
  3. 3.Peking UniversityBeijingChina
  4. 4.Institute of Information EngineeringBeijingChina

Bibliographic information