ICT systems security and privacy pro...
IFIP TC11 International Information Security Conference (2025 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • ICT systems security and privacy protection = 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.. Part I /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: ICT systems security and privacy protection/ edited by Lili Nemec Zlatolas ... [et al.].
    Reminder of title: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.
    remainder title: SEC 2025
    other author: Nemec Zlatolas, Lili.
    corporate name: IFIP TC11 International Information Security Conference
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: xiv, 254 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Privacy protection. -- Advanced strategies for privacy preserving data publishing to improve multi class classification. -- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers. -- SAAFL: Secure Aggregation for Label Aware Federated Learning. -- "We've met some problems": Developers' Issues With Privacy Preserving Computation Techniques on Stack Overflow. -- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis. -- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform. -- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration. -- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage. -- Industrial and Critical Infrastructure Security. -- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic. -- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems. -- Certified Secure Updates for IoT Devices. -- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing. -- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems. -- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects. -- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation. -- SAVA Deployment for Spoofed Source Attacks. -- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-92882-6
    ISBN: 9783031928826
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login