| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Foundations and practice of security/ edited by Kamel Adi ... [et al.]. |
| Reminder of title: |
17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024 : revised selected papers. |
| remainder title: |
FPS 2024 |
| other author: |
Adi, Kamel. |
| corporate name: |
FPS (Symposium) |
| Published: |
Cham :Springer Nature Switzerland : : 2025., |
| Description: |
xvi, 416 p. :ill. (chiefly color), digital ;24 cm. |
| [NT 15003449]: |
Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System's Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-3-031-87499-4 |
| ISBN: |
9783031874994 |