語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Availability, reliability and securi...
~
International Conference on Availability, Security, and Reliability (2025 : )
FindBook
Google Book
Amazon
博客來
Availability, reliability and security = ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Availability, reliability and security/ edited by Bart Coppens ... [et al.].
其他題名:
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.
其他題名:
ARES 2025
其他作者:
Coppens, Bart.
團體作者:
International Conference on Availability, Security, and Reliability
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xxv, 380 p. :ill. (some col.), digital ;24 cm.
內容註:
6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025): SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis -- Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey -- Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment -- Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies -- Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs -- Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems -- Quantum Security Mechanisms for Defense Applications -- Risk-Aware Adaptive Cyber Deception Guided by Large Language Models -- Reducing Information Overload: Because Even Security Experts Need to Blink. First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025): Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications -- Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information -- SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework -- Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats -- 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025): Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA -- Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches -- A Time Series Analysis of Malware Uploads to Programming Language Ecosystems -- A Role Taxonomy in Security-Safety Incident Response -- Promoting Privacy Compliant Data Management in Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model -- Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control -- An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites -- Large-scale security analysis of hardware wallets.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-032-00633-2
ISBN:
9783032006332
Availability, reliability and security = ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
Availability, reliability and security
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.Part II /[electronic resource] :ARES 2025edited by Bart Coppens ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xxv, 380 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,159951611-3349 ;. - Lecture notes in computer science ;15995..
6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025): SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis -- Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey -- Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment -- Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies -- Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs -- Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems -- Quantum Security Mechanisms for Defense Applications -- Risk-Aware Adaptive Cyber Deception Guided by Large Language Models -- Reducing Information Overload: Because Even Security Experts Need to Blink. First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025): Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications -- Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information -- SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework -- Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats -- 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025): Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA -- Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches -- A Time Series Analysis of Malware Uploads to Programming Language Ecosystems -- A Role Taxonomy in Security-Safety Incident Response -- Promoting Privacy Compliant Data Management in Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model -- Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control -- An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites -- Large-scale security analysis of hardware wallets.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).
ISBN: 9783032006332
Standard No.: 10.1007/978-3-032-00633-2doiSubjects--Topical Terms:
3790599
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Availability, reliability and security = ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
LDR
:05222nmm a2200373 a 4500
001
2414104
003
DE-He213
005
20250808130245.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783032006332
$q
(electronic bk.)
020
$a
9783032006325
$q
(paper)
024
7
$a
10.1007/978-3-032-00633-2
$2
doi
035
$a
978-3-032-00633-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2025
111
2
$a
International Conference on Availability, Security, and Reliability
$n
(20th :
$d
2025 :
$c
Ghent, Belgium)
$3
3790596
245
1 0
$a
Availability, reliability and security
$h
[electronic resource] :
$b
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.
$n
Part II /
$c
edited by Bart Coppens ... [et al.].
246
3
$a
ARES 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xxv, 380 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15995
505
0
$a
6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025): SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis -- Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey -- Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment -- Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies -- Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs -- Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems -- Quantum Security Mechanisms for Defense Applications -- Risk-Aware Adaptive Cyber Deception Guided by Large Language Models -- Reducing Information Overload: Because Even Security Experts Need to Blink. First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025): Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications -- Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information -- SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework -- Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats -- 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025): Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA -- Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches -- A Time Series Analysis of Malware Uploads to Programming Language Ecosystems -- A Role Taxonomy in Security-Safety Incident Response -- Promoting Privacy Compliant Data Management in Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model -- Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control -- An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites -- Large-scale security analysis of hardware wallets.
520
$a
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).
650
0
$a
Computer security
$v
Congresses.
$3
3790599
650
0
$a
Computers
$x
Reliability
$v
Congresses.
$3
3790600
650
1 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Coppens, Bart.
$3
3790597
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15995.
$3
3790598
856
4 0
$u
https://doi.org/10.1007/978-3-032-00633-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519559
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入