Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13784)
Included in the following conference series:
Conference proceedings info: ICISS 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity
detection; DKS-PKI: a distributed key server architecture for public key
infrastructure;generating-set evaluation of bloom filter hardening techniques in private
record linkage; etc
Similar content being viewed by others
Keywords
Table of contents (16 papers)
Other volumes
-
Information Systems Security
Editors and Affiliations
Bibliographic Information
Book Title: Information Systems Security
Book Subtitle: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings
Editors: Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-23690-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-031-23689-1Published: 11 December 2022
eBook ISBN: 978-3-031-23690-7Published: 10 December 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXVIII, 273
Number of Illustrations: 25 b/w illustrations, 77 illustrations in colour
Topics: Systems and Data Security