1 edition of Information Systems Security 5th International Conference Iciss 2009 Kolkata India December 1418 2009 Proceedings found in the catalog.
|The Physical Object|
|Pagination||xvi, 130 p. :|
|Number of Pages||70|
nodata File Size: 6MB.
Enrico Blanzieri and Tao Zhang, editors. Program Co-chair of the International Conference on Information Technology and Applied Mathematics during 30th October-1st November, 2017 at Haldia Institute of Technology, West Bengal, India• In Proceedings of the 21st International Conference on Distributed Computing and Networking ICDCN 2020in press, Kolkata, India, January 4-7, 2020. 11th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2018Melbourne, Australia, 2018.
In Proceedings of the 6th IEEE International Conference on Software Defined Systems. 297 [J55] Reza Mohammadi, Reza Javidan; Mauro Conti.
Arabian Journal for Science and Engineering Springer• Role: Member of the Evaluation Committee. 296, ISBN: 978-1-5386-1792-2, ISSN: 1063-6927. A Threat Model Method for ICS Malware: the TRISIS case. [C71] Mauro Conti, Vittoria Cozza; Marinella Petrocchi, Angelo Spognardi.
Collective Remote Attestation at the Internet of Things Scale: State-of-the-art and Future Challenges. OASIS: Operational Access Sandboxes for Information Security.
Dittrich, and Zahir Tari, editors. International Journal of Biometrics InderScience•
On Data Complexity of Distinguishing Attacks vs.
International Conference on Mathematics and Computing , January 5-10, 2015, Haldia, India.
Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann and Willi Meier.