語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure IT systems = 29th Nordic Conf...
~
Nordic Conference on Secure IT Systems (2024 :)
FindBook
Google Book
Amazon
博客來
Secure IT systems = 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Secure IT systems/ edited by Leonardo Horn Iwaya ... [et al.].
其他題名:
29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
其他題名:
NordSec 2024
其他作者:
Horn Iwaya, Leonardo.
團體作者:
Nordic Conference on Secure IT Systems
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xiii, 502 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-79007-2
ISBN:
9783031790072
Secure IT systems = 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
Secure IT systems
29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /[electronic resource] :NordSec 2024edited by Leonardo Horn Iwaya ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xiii, 502 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,153960302-9743 ;. - Lecture notes in computer science ;15396..
Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
ISBN: 9783031790072
Standard No.: 10.1007/978-3-031-79007-2doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Secure IT systems = 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
LDR
:03565nmm a2200373 a 4500
001
2408675
003
DE-He213
005
20250129115242.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031790072
$q
(electronic bk.)
020
$a
9783031790065
$q
(paper)
024
7
$a
10.1007/978-3-031-79007-2
$2
doi
035
$a
978-3-031-79007-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N832 2024
111
2
$a
Nordic Conference on Secure IT Systems
$n
(29th :
$d
2024 :
$c
Karlstad, Sweden)
$3
3781346
245
1 0
$a
Secure IT systems
$h
[electronic resource] :
$b
29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings /
$c
edited by Leonardo Horn Iwaya ... [et al.].
246
3
$a
NordSec 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 502 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
15396
505
0
$a
Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
520
$a
NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Horn Iwaya, Leonardo.
$3
3781347
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15396.
$3
3781348
856
4 0
$u
https://doi.org/10.1007/978-3-031-79007-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9514173
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入