Secure IT systems = 29th Nordic Conf...
Nordic Conference on Secure IT Systems (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Secure IT systems = 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Secure IT systems/ edited by Leonardo Horn Iwaya ... [et al.].
    Reminder of title: 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
    remainder title: NordSec 2024
    other author: Horn Iwaya, Leonardo.
    corporate name: Nordic Conference on Secure IT Systems
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: xiii, 502 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-79007-2
    ISBN: 9783031790072
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login