Advertisement

Information Systems Security

10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings

  • Atul Prakash
  • Rudrapatna Shyamasundar

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8880)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu
      Pages 1-8
    2. Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar
      Pages 9-29
  3. Contributed Papers

    1. Security Inferences

      1. R. Ramanujam, Vaishnavi Sundararajan, S. P. Suresh
        Pages 50-68
      2. Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens
        Pages 69-88
      3. Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens
        Pages 89-108
    2. Security Policies

      1. Arindam Roy, Shamik Sural, Arun Kumar Majumdar
        Pages 109-128
      2. Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
        Pages 129-148
      3. Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar
        Pages 149-166
    3. Security User Interfaces

      1. Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee
        Pages 185-203
      2. Peter Mayer, Melanie Volkamer, Michaela Kauer
        Pages 204-225
      3. Hiten Choudhury, Basav Roychoudhury, Dilip kr. Saikia
        Pages 226-244
      4. Xiaolei Li, Xinshu Dong, Zhenkai Liang
        Pages 245-256
    4. Security Attacks

      1. Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti
        Pages 257-276
      2. Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada
        Pages 277-297
      3. Tanmay Thakur, Rakesh Verma
        Pages 318-337
    5. Malware Detection

      1. Paolo Rovelli, Ýmir Vigfússon
        Pages 338-357
      2. Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat
        Pages 358-377
      3. Richard Gay, Jinwei Hu, Heiko Mantel
        Pages 378-398
      4. Aditya Basu, Anish Mathuria, Nagendra Chowdary
        Pages 399-410
    6. Forensics

      1. Biswajit Halder, Rajkumar Darbar, Utpal Garain, Abhoy Ch. Mondal
        Pages 411-424
      2. Puneet Gupta, Phalguni Gupta
        Pages 425-436
    7. Location Based Security Services

      1. Sumitra Biswal, Goutam Paul, Shashwat Raizada
        Pages 448-463
      2. Thong M. Doan, Han N. Dinh, Nam T. Nguyen, Phuoc T. Tran
        Pages 464-476
  4. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.

Keywords

JPEG compression Web security authentication biometrics bitcoins browser vulnerabilities cyber attacks data mining electronic cash system encryption extension-based attacks formal model image authentication machine learning malware detection system network security obfuscation outsourcing trust usable security

Editors and affiliations

  • Atul Prakash
    • 1
  • Rudrapatna Shyamasundar
    • 2
  1. 1.Department of EECSUniversity of MichiganAnn ArborUSA
  2. 2.Faculty of Technology and Computer ScienceTata Institute of Fundamental ResearchMumbaiIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-13841-1
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-13840-4
  • Online ISBN 978-3-319-13841-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering