ICT systems security and privacy pro...
IFIP TC11 International Information Security Conference (2025 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • ICT systems security and privacy protection = 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: ICT systems security and privacy protection/ edited by Lili Nemec Zlatolas ... [et al.].
    Reminder of title: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.
    remainder title: SEC 2025
    other author: Nemec Zlatolas, Lili.
    corporate name: IFIP TC11 International Information Security Conference
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: xiv, 280 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- "You still have to study" On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-92886-4
    ISBN: 9783031928864
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login