Secure IT systems = 29th Nordic Conf...
Nordic Conference on Secure IT Systems (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Secure IT systems = 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Secure IT systems/ edited by Leonardo Horn Iwaya ... [et al.].
    其他題名: 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
    其他題名: NordSec 2024
    其他作者: Horn Iwaya, Leonardo.
    團體作者: Nordic Conference on Secure IT Systems
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xiii, 502 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-79007-2
    ISBN: 9783031790072
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入