Foundations and Practice of Security: 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I: Lecture Notes in Computer Science, cartea 14551
Editat de Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaroen Limba Engleză Paperback – 25 apr 2024
The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections:
Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.
Part II : security design, short papers.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 339.19 lei 6-8 săpt. | |
| Springer Nature Switzerland – 25 apr 2024 | 339.19 lei 6-8 săpt. | |
| Springer Nature Switzerland – 25 apr 2024 | 519.88 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 461.83 lei - 20%
Preț: 461.57 lei - 20%
Preț: 424.26 lei - 20%
Preț: 390.69 lei - 20%
Preț: 498.50 lei - 15%
Preț: 388.50 lei - 20%
Preț: 390.35 lei - 20%
Preț: 460.98 lei - 20%
Preț: 461.52 lei - 20%
Preț: 497.55 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.83 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 391.14 lei - 20%
Preț: 389.85 lei - 20%
Preț: 461.32 lei - 20%
Preț: 498.32 lei - 20%
Preț: 496.64 lei - 20%
Preț: 532.28 lei - 20%
Preț: 527.36 lei - 20%
Preț: 498.46 lei - 15%
Preț: 461.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 532.41 lei - 20%
Preț: 462.24 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 252.15 lei - 20%
Preț: 390.94 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.86 lei - 20%
Preț: 532.54 lei - 20%
Preț: 462.67 lei - 20%
Preț: 461.65 lei - 20%
Preț: 639.72 lei - 20%
Preț: 255.91 lei - 15%
Preț: 535.92 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 499.36 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.20 lei - 20%
Preț: 249.95 lei
Preț: 519.88 lei
Preț vechi: 649.85 lei
-20% Nou
Puncte Express: 780
Preț estimativ în valută:
91.99€ • 108.02$ • 80.74£
91.99€ • 108.02$ • 80.74£
Carte tipărită la comandă
Livrare economică 27 ianuarie-10 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031575365
ISBN-10: 3031575369
Pagini: 460
Ilustrații: XIX, 460 p. 120 illus., 94 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.67 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031575369
Pagini: 460
Ilustrații: XIX, 460 p. 120 illus., 94 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.67 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
AI and Cybersecurity.- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection.- Securing Smart Vehicles through Federated Learning.- Using Reed-Muller Codes for Classification with Rejection and Recovery.- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection.- Security Analysis.- Practices for Assessing the Security Level of Solidity Smart Contracts.- Effectiveness of Binary-Level CFI Techniques.- A Small World–Privacy Preserving IoT Device-type Fingerprinting with Small Datasets.- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber.- Phishing and Social Network.- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?.- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets.- Web Scams Detection System.- Vulnerabilities and Exploits.- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes.- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives.- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study.- Network and System Threat.- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations.- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware.- Automated Attacker Behaviour Classification Using Threat Intelligence Insights.- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls.- Malware Analysis.- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr.- Original Entry Pointdetection based on graph similarity.- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure.- Security Design.- Hardening Systems Against Data Corruption Attacks at Design Time.- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols.- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm.- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.