ICT Systems Security and Privacy Protection: 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings: IFIP Advances in Information and Communication Technology, cartea 710
Editat de Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakisen Limba Engleză Hardback – 5 sep 2024
The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy.
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 746.71 lei - 20%
Preț: 559.95 lei - 20%
Preț: 555.69 lei - 20%
Preț: 623.07 lei - 20%
Preț: 623.39 lei - 20%
Preț: 327.36 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 327.99 lei - 20%
Preț: 528.48 lei - 20%
Preț: 527.38 lei - 20%
Preț: 424.44 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1116.37 lei - 18%
Preț: 909.08 lei - 20%
Preț: 1232.88 lei - 20%
Preț: 689.95 lei - 18%
Preț: 911.54 lei - 15%
Preț: 616.15 lei - 18%
Preț: 1216.83 lei - 15%
Preț: 613.18 lei - 15%
Preț: 611.74 lei - 20%
Preț: 957.62 lei - 20%
Preț: 619.71 lei - 18%
Preț: 911.54 lei - 15%
Preț: 616.45 lei - 20%
Preț: 944.97 lei - 20%
Preț: 1231.59 lei - 20%
Preț: 1226.84 lei - 20%
Preț: 616.05 lei - 20%
Preț: 1232.08 lei - 20%
Preț: 952.00 lei - 20%
Preț: 1232.88 lei - 15%
Preț: 611.23 lei - 18%
Preț: 1183.12 lei - 20%
Preț: 1848.88 lei - 18%
Preț: 1171.97 lei - 15%
Preț: 611.23 lei - 18%
Preț: 914.70 lei - 20%
Preț: 968.03 lei - 20%
Preț: 2110.89 lei - 20%
Preț: 1237.63 lei - 20%
Preț: 634.64 lei - 20%
Preț: 623.22 lei - 20%
Preț: 1235.90 lei - 20%
Preț: 1327.97 lei - 18%
Preț: 1180.37 lei - 20%
Preț: 623.18 lei - 20%
Preț: 640.33 lei
Preț: 677.66 lei
Preț vechi: 847.07 lei
-20% Nou
Puncte Express: 1016
Preț estimativ în valută:
119.93€ • 140.16$ • 104.12£
119.93€ • 140.16$ • 104.12£
Carte tipărită la comandă
Livrare economică 13-19 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031651748
ISBN-10: 303165174X
Pagini: 496
Ilustrații: XX, 477 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
ISBN-10: 303165174X
Pagini: 496
Ilustrații: XX, 477 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
Cuprins
.- Towards a Mobility-Aware Trust Model for the Internet of Underwater Things.
.- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS.
.- Reduce to the MACs - Privacy Friendly Generic Probe Requests.
.- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers.
.- Keep your memory dump shut: Unveiling data leaks in password managers.
.- DryJIN: Detecting Information Leaks in Android Applications.
.- Bruteware: A Novel Family of Cryptoviral Attacks.
.- Towards Practical Hardware Fingerprinting for Remote Attestation.
.- Examining the Strength of Three Word Passwords.
.- Can Synthetic Data preserve Manifold properties?.
.- ”Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings.
.- Putting Authorization Servers on User-owned Devices in User-Managed Access.
.- Identification of cyber threats and vulnerabilities in Norwegian distribution networks.
.- Chain of trust: Unraveling references among Common Criteria certified products.
.- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems.
.- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages.
.- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration.
.- Transforming EU Governance: The Digital Integration through EBSI and GLASS.
.- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics.
.- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware.
.- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration.
.- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning.
.- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems.
.- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption.
.- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System.
.- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms.
.- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps.
.- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations.
.- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management.
.- Detecting Web Bots via Keystroke Dynamics.
.- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment.
.- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
.- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
.- Predicting the execution time of secure neural network inference.
.- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS.
.- Reduce to the MACs - Privacy Friendly Generic Probe Requests.
.- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers.
.- Keep your memory dump shut: Unveiling data leaks in password managers.
.- DryJIN: Detecting Information Leaks in Android Applications.
.- Bruteware: A Novel Family of Cryptoviral Attacks.
.- Towards Practical Hardware Fingerprinting for Remote Attestation.
.- Examining the Strength of Three Word Passwords.
.- Can Synthetic Data preserve Manifold properties?.
.- ”Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings.
.- Putting Authorization Servers on User-owned Devices in User-Managed Access.
.- Identification of cyber threats and vulnerabilities in Norwegian distribution networks.
.- Chain of trust: Unraveling references among Common Criteria certified products.
.- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems.
.- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages.
.- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration.
.- Transforming EU Governance: The Digital Integration through EBSI and GLASS.
.- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics.
.- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware.
.- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration.
.- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning.
.- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems.
.- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption.
.- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System.
.- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms.
.- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps.
.- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations.
.- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management.
.- Detecting Web Bots via Keystroke Dynamics.
.- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment.
.- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
.- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
.- Predicting the execution time of secure neural network inference.