© 2014

Information Systems Security

10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings

  • Atul Prakash
  • Rudrapatna Shyamasundar
Conference proceedings ICISS 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8880)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu
      Pages 1-8
    2. Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar
      Pages 9-29
  3. Contributed Papers

    1. Security Inferences

      1. R. Ramanujam, Vaishnavi Sundararajan, S. P. Suresh
        Pages 50-68
      2. Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens
        Pages 69-88
      3. Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens
        Pages 89-108
    2. Security Policies

      1. Arindam Roy, Shamik Sural, Arun Kumar Majumdar
        Pages 109-128
      2. Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
        Pages 129-148
      3. Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar
        Pages 149-166
    3. Security User Interfaces

      1. Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee
        Pages 185-203
      2. Peter Mayer, Melanie Volkamer, Michaela Kauer
        Pages 204-225
      3. Hiten Choudhury, Basav Roychoudhury, Dilip kr. Saikia
        Pages 226-244
      4. Xiaolei Li, Xinshu Dong, Zhenkai Liang
        Pages 245-256
    4. Security Attacks

      1. Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti
        Pages 257-276
      2. Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada
        Pages 277-297
      3. Tanmay Thakur, Rakesh Verma
        Pages 318-337
    5. Malware Detection

      1. Paolo Rovelli, Ýmir Vigfússon
        Pages 338-357

About these proceedings


This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.


JPEG compression Web security authentication biometrics bitcoins browser vulnerabilities cyber attacks data mining electronic cash system encryption extension-based attacks formal model image authentication machine learning malware detection system network security obfuscation outsourcing trust usable security

Editors and affiliations

  • Atul Prakash
    • 1
  • Rudrapatna Shyamasundar
    • 2
  1. 1.Department of EECSUniversity of MichiganAnn ArborUSA
  2. 2.Faculty of Technology and Computer ScienceTata Institute of Fundamental ResearchMumbaiIndia

Bibliographic information

  • Book Title Information Systems Security
  • Book Subtitle 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings
  • Editors Atul Prakash
    Rudrapatna Shyamasundar
  • Series Title Lecture Notes in Computer Science
  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-319-13840-4
  • eBook ISBN 978-3-319-13841-1
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XXIV, 478
  • Number of Illustrations 163 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Computer Communication Networks
  • Buy this book on publisher's site