Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy in cyber-physic...
~
SmartSP (Conference) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy in cyber-physical systems and smart vehicles = second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy in cyber-physical systems and smart vehicles/ edited by Xiali Hei ... [et al.].
Reminder of title:
second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024 : proceedings /
remainder title:
SmartSP 2024
other author:
Hei, Xiali.
corporate name:
SmartSP (Conference)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xiii, 368 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Emerging Applications -- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics -- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing -- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer -- Security Techniques for Cyber-Physical Systems -- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots -- Software Bill of Materials Management for Embedded Vehicle Systems -- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement -- A Case Study of API Design for Interoperability and Security of the Internet of Things -- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments -- Hardware and Firmware Security -- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair -- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network -- RustBound: Function Boundary Detection over Rust Stripped Binaries -- Adversarial Attacks in Autonomous Systems -- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving -- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study -- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles -- Ethics, Privacy, and Human-Centric Considerations -- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment -- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles -- Privacy-Enrooted Car Systems (PECS): Preliminary Design -- Demos -- Demo: All-in-One Solution for Online Abuse Research.
Contained By:
Springer Nature eBook
Subject:
Cooperating objects (Computer systems) - Congresses. - Security measures -
Online resource:
https://doi.org/10.1007/978-3-031-93354-7
ISBN:
9783031933547
Security and privacy in cyber-physical systems and smart vehicles = second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024 : proceedings /
Security and privacy in cyber-physical systems and smart vehicles
second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024 : proceedings /[electronic resource] :SmartSP 2024edited by Xiali Hei ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xiii, 368 p. :ill. (some col.), digital ;24 cm. - Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering,6221867-822X ;. - Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;622..
Emerging Applications -- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics -- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing -- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer -- Security Techniques for Cyber-Physical Systems -- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots -- Software Bill of Materials Management for Embedded Vehicle Systems -- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement -- A Case Study of API Design for Interoperability and Security of the Internet of Things -- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments -- Hardware and Firmware Security -- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair -- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network -- RustBound: Function Boundary Detection over Rust Stripped Binaries -- Adversarial Attacks in Autonomous Systems -- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving -- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study -- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles -- Ethics, Privacy, and Human-Centric Considerations -- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment -- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles -- Privacy-Enrooted Car Systems (PECS): Preliminary Design -- Demos -- Demo: All-in-One Solution for Online Abuse Research.
This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7-8, 2024. The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems.
ISBN: 9783031933547
Standard No.: 10.1007/978-3-031-93354-7doiSubjects--Topical Terms:
3251652
Cooperating objects (Computer systems)
--Security measures--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 006.22
Security and privacy in cyber-physical systems and smart vehicles = second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024 : proceedings /
LDR
:03784nmm a2200361 a 4500
001
2413287
003
DE-He213
005
20250627131025.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031933547
$q
(electronic bk.)
020
$a
9783031933530
$q
(paper)
024
7
$a
10.1007/978-3-031-93354-7
$2
doi
035
$a
978-3-031-93354-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UB
$2
bicssc
072
7
$a
COM005000
$2
bisacsh
072
7
$a
UX
$2
thema
082
0 4
$a
006.22
$2
23
090
$a
QA76.9.A25
$b
S636 2024
111
2
$a
SmartSP (Conference)
$n
(2nd :
$d
2024 :
$c
New Orleans, La.)
$3
3789227
245
1 0
$a
Security and privacy in cyber-physical systems and smart vehicles
$h
[electronic resource] :
$b
second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024 : proceedings /
$c
edited by Xiali Hei ... [et al.].
246
3
$a
SmartSP 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 368 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering,
$x
1867-822X ;
$v
622
505
0
$a
Emerging Applications -- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics -- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing -- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer -- Security Techniques for Cyber-Physical Systems -- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots -- Software Bill of Materials Management for Embedded Vehicle Systems -- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement -- A Case Study of API Design for Interoperability and Security of the Internet of Things -- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments -- Hardware and Firmware Security -- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair -- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network -- RustBound: Function Boundary Detection over Rust Stripped Binaries -- Adversarial Attacks in Autonomous Systems -- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving -- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study -- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles -- Ethics, Privacy, and Human-Centric Considerations -- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment -- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles -- Privacy-Enrooted Car Systems (PECS): Preliminary Design -- Demos -- Demo: All-in-One Solution for Online Abuse Research.
520
$a
This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7-8, 2024. The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems.
650
0
$a
Cooperating objects (Computer systems)
$x
Security measures
$v
Congresses.
$3
3251652
650
1 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Computer System Implementation.
$3
892710
650
2 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Special Purpose and Application-Based Systems.
$3
892492
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Hei, Xiali.
$3
3616929
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;
$v
622.
$3
3789228
856
4 0
$u
https://doi.org/10.1007/978-3-031-93354-7
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9518742
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login