語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
ICT systems security and privacy pro...
~
IFIP TC11 International Information Security Conference (2024 :)
FindBook
Google Book
Amazon
博客來
ICT systems security and privacy protection = 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
ICT systems security and privacy protection/ edited by Nikolaos Pitropakis ... [et al.].
其他題名:
39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, proceedings /
其他題名:
SEC 2024
其他作者:
Pitropakis, Nikolaos.
團體作者:
IFIP TC11 International Information Security Conference
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xiv, 496 p. :ill. (chiefly col.), digital ;24 cm.
內容註:
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- "Alexa, How Do You Protect My Privacy?" A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-65175-5
ISBN:
9783031651755
ICT systems security and privacy protection = 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, proceedings /
ICT systems security and privacy protection
39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, proceedings /[electronic resource] :SEC 2024edited by Nikolaos Pitropakis ... [et al.]. - Cham :Springer Nature Switzerland :2024. - xiv, 496 p. :ill. (chiefly col.), digital ;24 cm. - IFIP advances in information and communication technology,7101868-422X ;. - IFIP advances in information and communication technology ;710..
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- "Alexa, How Do You Protect My Privacy?" A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference.
This book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, held in Edinburgh, UK, during June 12-14, 2024. The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy.
ISBN: 9783031651755
Standard No.: 10.1007/978-3-031-65175-5doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
ICT systems security and privacy protection = 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, proceedings /
LDR
:04511nmm a2200349 a 4500
001
2373879
003
DE-He213
005
20240726125301.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031651755
$q
(electronic bk.)
020
$a
9783031651748
$q
(paper)
024
7
$a
10.1007/978-3-031-65175-5
$2
doi
035
$a
978-3-031-65175-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UB
$2
bicssc
072
7
$a
COM000000
$2
bisacsh
072
7
$a
UB
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I23 2024
111
2
$a
IFIP TC11 International Information Security Conference
$n
(39th :
$d
2024 :
$c
Edinburgh, Scotland)
$3
3722307
245
1 0
$a
ICT systems security and privacy protection
$h
[electronic resource] :
$b
39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, proceedings /
$c
edited by Nikolaos Pitropakis ... [et al.].
246
3
$a
SEC 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xiv, 496 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
IFIP advances in information and communication technology,
$x
1868-422X ;
$v
710
505
0
$a
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- "Alexa, How Do You Protect My Privacy?" A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference.
520
$a
This book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, held in Edinburgh, UK, during June 12-14, 2024. The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
1 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Cryptology.
$3
3382308
700
1
$a
Pitropakis, Nikolaos.
$3
3722308
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
IFIP advances in information and communication technology ;
$v
710.
$3
3722309
856
4 0
$u
https://doi.org/10.1007/978-3-031-65175-5
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9494328
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入