ICT Systems Security and Privacy Protection: 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings: IFIP Advances in Information and Communication Technology, cartea 710
Editat de Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakisen Limba Engleză Hardback – 5 sep 2024
The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy.
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 746.71 lei - 20%
Preț: 555.69 lei - 20%
Preț: 623.07 lei - 20%
Preț: 623.39 lei - 20%
Preț: 327.36 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 327.99 lei - 20%
Preț: 559.95 lei - 20%
Preț: 528.48 lei - 15%
Preț: 527.06 lei - 20%
Preț: 527.38 lei - 20%
Preț: 424.44 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1116.37 lei - 18%
Preț: 909.08 lei - 20%
Preț: 1232.88 lei - 20%
Preț: 689.95 lei - 20%
Preț: 1237.46 lei - 20%
Preț: 1235.90 lei - 18%
Preț: 921.04 lei - 18%
Preț: 1176.56 lei - 20%
Preț: 1848.88 lei - 20%
Preț: 1231.59 lei - 18%
Preț: 1183.54 lei - 20%
Preț: 1236.38 lei - 20%
Preț: 2110.89 lei - 18%
Preț: 1187.02 lei - 15%
Preț: 611.74 lei - 18%
Preț: 1179.16 lei - 15%
Preț: 616.45 lei - 18%
Preț: 1187.64 lei - 15%
Preț: 613.18 lei - 18%
Preț: 1191.27 lei - 18%
Preț: 1185.98 lei - 18%
Preț: 1178.22 lei - 20%
Preț: 1327.97 lei - 20%
Preț: 952.00 lei - 18%
Preț: 1183.12 lei - 20%
Preț: 1666.09 lei - 20%
Preț: 1237.63 lei - 18%
Preț: 1181.44 lei - 18%
Preț: 1179.90 lei - 20%
Preț: 623.22 lei - 18%
Preț: 916.93 lei - 20%
Preț: 614.65 lei - 20%
Preț: 1235.10 lei - 18%
Preț: 913.45 lei
Preț: 677.66 lei
Preț vechi: 847.07 lei
-20% Nou
Puncte Express: 1016
Preț estimativ în valută:
119.92€ • 139.84$ • 105.29£
119.92€ • 139.84$ • 105.29£
Carte tipărită la comandă
Livrare economică 12-19 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031651748
ISBN-10: 303165174X
Pagini: 496
Ilustrații: XX, 477 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
ISBN-10: 303165174X
Pagini: 496
Ilustrații: XX, 477 p.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
Cuprins
.- Towards a Mobility-Aware Trust Model for the Internet of Underwater Things.
.- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS.
.- Reduce to the MACs - Privacy Friendly Generic Probe Requests.
.- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers.
.- Keep your memory dump shut: Unveiling data leaks in password managers.
.- DryJIN: Detecting Information Leaks in Android Applications.
.- Bruteware: A Novel Family of Cryptoviral Attacks.
.- Towards Practical Hardware Fingerprinting for Remote Attestation.
.- Examining the Strength of Three Word Passwords.
.- Can Synthetic Data preserve Manifold properties?.
.- ”Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings.
.- Putting Authorization Servers on User-owned Devices in User-Managed Access.
.- Identification of cyber threats and vulnerabilities in Norwegian distribution networks.
.- Chain of trust: Unraveling references among Common Criteria certified products.
.- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems.
.- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages.
.- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration.
.- Transforming EU Governance: The Digital Integration through EBSI and GLASS.
.- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics.
.- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware.
.- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration.
.- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning.
.- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems.
.- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption.
.- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System.
.- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms.
.- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps.
.- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations.
.- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management.
.- Detecting Web Bots via Keystroke Dynamics.
.- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment.
.- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
.- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
.- Predicting the execution time of secure neural network inference.
.- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS.
.- Reduce to the MACs - Privacy Friendly Generic Probe Requests.
.- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers.
.- Keep your memory dump shut: Unveiling data leaks in password managers.
.- DryJIN: Detecting Information Leaks in Android Applications.
.- Bruteware: A Novel Family of Cryptoviral Attacks.
.- Towards Practical Hardware Fingerprinting for Remote Attestation.
.- Examining the Strength of Three Word Passwords.
.- Can Synthetic Data preserve Manifold properties?.
.- ”Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings.
.- Putting Authorization Servers on User-owned Devices in User-Managed Access.
.- Identification of cyber threats and vulnerabilities in Norwegian distribution networks.
.- Chain of trust: Unraveling references among Common Criteria certified products.
.- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems.
.- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages.
.- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration.
.- Transforming EU Governance: The Digital Integration through EBSI and GLASS.
.- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics.
.- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware.
.- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration.
.- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning.
.- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems.
.- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption.
.- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System.
.- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms.
.- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps.
.- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations.
.- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management.
.- Detecting Web Bots via Keystroke Dynamics.
.- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment.
.- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
.- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
.- Predicting the execution time of secure neural network inference.