| 紀錄類型: |
書目-電子資源
: Monograph/item
|
| 正題名/作者: |
ICT systems security and privacy protection/ edited by Norbert Meyer, Anna Grocholewska-Czuryło. |
| 其他題名: |
38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023 : revised selected papers / |
| 其他題名: |
SEC 2023 |
| 其他作者: |
Meyer, Norbert. |
| 團體作者: |
IFIP TC11 International Information Security Conference |
| 出版者: |
Cham :Springer Nature Switzerland : : 2024., |
| 面頁冊數: |
xiii, 378 p. :ill. (some col.), digital ;24 cm. |
| 內容註: |
Web Content Integrity Tamper-proof websites beyond HTTPS -- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP -- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design -- The Influence of Privacy Concerns on Cryptocurrency Acceptance -- Automated Enrichment of Logical Attack Graphs via Formal Ontologies -- Detecting Web Bots via Mouse Dynamics and Communication Metadata -- Practical Single-Round Secure Wildcard Pattern Matching -- Efficient non-interactive anonymous communication -- PointPuff An Ed25519 Optimization Implementation -- Detecting web tracking at the network layer -- What's inside a node? Malicious IPFS nodes under the magnifying glass -- Quantum-secure Communication for Trusted Edge Computing with IoT Devices -- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises -- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe -- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network -- Towards An Information Privacy Competency Model for the Usage of Mobile Applications -- SecPassInput: Towards Secure Memory and Password Handling in Web Applications -- Bl0ck Paralyzing 802.11 connections through Block Ack frames -- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates -- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis -- Cyber Key Terrain Identification Using Adjusted PageRank Centrality -- Machine Learning Metrics for Network Datasets Evaluation -- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools -- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack -- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection -- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. |
| Contained By: |
Springer Nature eBook |
| 標題: |
Computer security - Congresses. - |
| 電子資源: |
https://doi.org/10.1007/978-3-031-56326-3 |
| ISBN: |
9783031563263 |