Information security applications = ...
WISA (Workshop : Information security) (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security applications/ edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee.
    Reminder of title: 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
    remainder title: WISA 2024
    other author: Lee, Jong-Hyouk.
    corporate name: WISA (Workshop : Information security)
    Published: Singapore :Springer Nature Singapore : : 2025.,
    Description: xxii, 378 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-96-1624-4
    ISBN: 9789819616244
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login