| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Information security applications/ edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee. |
| Reminder of title: |
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers / |
| remainder title: |
WISA 2024 |
| other author: |
Lee, Jong-Hyouk. |
| corporate name: |
WISA (Workshop : Information security) |
| Published: |
Singapore :Springer Nature Singapore : : 2025., |
| Description: |
xxii, 378 p. :ill. (some col.), digital ;24 cm. |
| [NT 15003449]: |
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-981-96-1624-4 |
| ISBN: |
9789819616244 |