Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security applications = ...
~
WISA (Workshop : Information security) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information security applications/ edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee.
Reminder of title:
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
remainder title:
WISA 2024
other author:
Lee, Jong-Hyouk.
corporate name:
WISA (Workshop : Information security)
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xxii, 378 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-96-1624-4
ISBN:
9789819616244
Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
Information security applications
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /[electronic resource] :WISA 2024edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee. - Singapore :Springer Nature Singapore :2025. - xxii, 378 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,154990302-9743 ;. - Lecture notes in computer science ;15499..
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024. The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
ISBN: 9789819616244
Standard No.: 10.1007/978-981-96-1624-4doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
LDR
:04314nmm a2200373 a 4500
001
2408693
003
DE-He213
005
20250204115223.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819616244
$q
(electronic bk.)
020
$a
9789819616237
$q
(paper)
024
7
$a
10.1007/978-981-96-1624-4
$2
doi
035
$a
978-981-96-1624-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W811 2024
111
2
$a
WISA (Workshop : Information security)
$n
(25th :
$d
2024 :
$c
Cheju Island, Korea)
$3
3781389
245
1 0
$a
Information security applications
$h
[electronic resource] :
$b
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
$c
edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee.
246
3
$a
WISA 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxii, 378 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
15499
505
0
$a
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
520
$a
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024. The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Lee, Jong-Hyouk.
$3
3251594
700
1
$a
Emura, Keita.
$3
3781390
700
1
$a
Lee, Sokjoon.
$3
3781391
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15499.
$3
3781392
856
4 0
$u
https://doi.org/10.1007/978-981-96-1624-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514191
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login