Home
Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, Proceedings
Barnes and Noble
Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, Proceedings
Current price: $69.99


Barnes and Noble
Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, Proceedings
Current price: $69.99
Size: Paperback
Loading Inventory...
*Product information may vary - to confirm product availability, pricing, shipping and return information please contact Barnes and Noble
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022
The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity
detection; DKS-PKI: a distributed key server architecture for public key
infrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc
The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similarity
detection; DKS-PKI: a distributed key server architecture for public key
infrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc