Advertisement

Information and Communications Security

21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers

  • Jianying Zhou
  • Xiapu Luo
  • Qingni Shen
  • Zhen Xu
Conference proceedings ICICS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11999)

Also part of the Security and Cryptology book sub series (LNSC, volume 11999)

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Malware Analysis and Detection

    1. Front Matter
      Pages 1-1
    2. Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng
      Pages 3-17
    3. Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla
      Pages 18-33
    4. Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun
      Pages 34-50
  3. IoT and CPS Security

    1. Front Matter
      Pages 51-51
    2. Maged Abdelaty, Roberto Doriguzzi-Corin, Domenico Siracusa
      Pages 53-70
    3. Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun
      Pages 71-88
    4. WeiPeng Jiang, Bin Wu, Zhou Jiang, ShaoBo Yang
      Pages 89-104
    5. Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang
      Pages 124-142
  4. Enterprise Network Security

  5. Software Security

    1. Front Matter
      Pages 197-197
    2. Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
      Pages 219-232
    3. Qiu Chen, Danping Shi, Siwei Sun, Lei Hu
      Pages 233-247
  6. System Security

    1. Front Matter
      Pages 249-249
    2. Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou
      Pages 269-286
    3. Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu
      Pages 287-304
  7. Authentication

    1. Front Matter
      Pages 305-305
    2. Andreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher
      Pages 307-323
    3. Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo et al.
      Pages 324-340
    4. Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng
      Pages 341-356
  8. Applied Cryptograph

    1. Front Matter
      Pages 357-357
    2. Tian Qiu, Lin Hou, Dongdai Lin
      Pages 359-377
    3. Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li et al.
      Pages 430-446
    4. Huaifeng Chen, Rui Zong, Xiaoyang Dong
      Pages 447-462
  9. Internet Security

    1. Front Matter
      Pages 501-501
    2. Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Liang Bin
      Pages 503-520
    3. Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun
      Pages 521-538
    4. Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath
      Pages 539-554
    5. Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li
      Pages 555-568
    6. Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang
      Pages 569-583
    7. Zhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan
      Pages 584-599
  10. Machine Learning Security

    1. Front Matter
      Pages 601-601
    2. Chunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang, Chuanyi Liu
      Pages 603-612
    3. Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu
      Pages 613-629
    4. Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming
      Pages 630-645
  11. Machine Learning Privacy

    1. Front Matter
      Pages 647-647
    2. Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li
      Pages 649-667
    3. Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang
      Pages 668-683

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.

Keywords

artificial intelligence authentication communication systems computer crime computer networks computer security computer systems cryptography data communication systems data security engineering internet machine learning mathematics network protocols network security signal processing telecommunication networks telecommunication systems wireless telecommunication systems

Editors and affiliations

  1. 1.Singapore University of Technology and DesignSingaporeSingapore
  2. 2.The Hong Kong Polytechnic UniversityKowloonHong Kong
  3. 3.Peking UniversityBeijingChina
  4. 4.Institute of Information EngineeringBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-41579-2
  • Copyright Information Springer Nature Switzerland AG 2020
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-41578-5
  • Online ISBN 978-3-030-41579-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering