Skip to main content
  • Conference proceedings
  • © 2021

Information Systems Security

17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13146)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2021.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (15 papers)

  1. Front Matter

    Pages i-xviii
  2. Attack Detection

    1. Front Matter

      Pages 1-1
    2. Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces

      • Khandakar Ashrafi Akbar, Yigong Wang, Md Shihabul Islam, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham
      Pages 3-25
    3. WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters

      • Shaurya Sood, Manash Saikia, Neminath Hubballi
      Pages 26-37
    4. Multi Layer Detection Framework for Spear-Phishing Attacks

      • Shivani Arya, Saurabh Chamotra
      Pages 38-56
  3. Malware Identification

    1. Front Matter

      Pages 73-73
    2. Raising MIPS Binaries to LLVM IR

      • Sandeep Romana, Anil D. Bandgar, Mohit Kumar, Mahesh U. Patil, P. R. Lakshmi Eswari
      Pages 94-108
  4. Data Security in Distributed Systems

    1. Front Matter

      Pages 109-109
    2. Automated Identification of Social Media Bots Using Deepfake Text Detection

      • Sina Mahdipour Saravani, Indrajit Ray, Indrakshi Ray
      Pages 111-123
    3. Landcoin: A Practical Protocol for Transfer-of-Asset

      • Vishwas Patil, R. K. Shyamasundar
      Pages 124-141
    4. WiP: A Distributed Approach for Statistical Disclosure Control Technologies

      • Afshin Amighi, Mortaza S. Bargh, Ahmad Omar
      Pages 142-153
  5. Applied Cryptography

    1. Front Matter

      Pages 155-155
    2. Experimental Verification of Estimated Block Size of BKZ Algorithm Against LWE

      • Amane Takeshige, Haruhisa Kosuge, Hidema Tanaka
      Pages 173-184
    3. WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques

      • Habeeb Syed, Imtiyazuddin Shaik, Nitesh Emmadi, Harika Narumanchi, Meena Singh Dilip Thakur, Rajan Mindigal Alasingara Bhattachar
      Pages 185-197
    4. WiP: QoS Based Recommendation System for Efficient Private Inference of CNN Using FHE

      • Imtiyazuddin Shaik, Raj Chaudhari, M. A. Rajan, J. Gubbi, P. Balamuralidhar, S. Lodha
      Pages 198-211
    5. Improvement over Montgomery Modular Multiplication

      • Debapriyay Mukhopadhyay
      Pages 212-217
    6. Faster Private Rating Update via Integer-Based Homomorphic Encryption

      • Pranav Verma, Anish Mathuria, Sourish Dasgupta
      Pages 218-236

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021.

The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.

Keywords

  • artificial intelligence
  • authentication
  • communication systems
  • computer crime
  • computer networks
  • computer security
  • computer systems
  • cryptography
  • data communication systems
  • data mining
  • data security
  • machine learning
  • network protocols
  • network security
  • privacy preserving
  • public key cryptography
  • signal processing
  • software engineering
  • telecommunication systems

Editors and Affiliations

  • Indian Institute of Technology Patna, Patna, India

    Somanath Tripathy

  • Indian Institute of Technology Bombay, Mumbai, India

    Rudrapatna K. Shyamasundar

  • Newcastle University, Newcastle upon Tyne, UK

    Rajiv Ranjan

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access