Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Availability, reliability and securi...
~
International Conference on Availability, Security, and Reliability (2025 : )
Linked to FindBook
Google Book
Amazon
博客來
Availability, reliability and security = ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Availability, reliability and security/ edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter.
Reminder of title:
ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.
remainder title:
ARES 2025
other author:
Skopik, Florian.
corporate name:
International Conference on Availability, Security, and Reliability
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xxvii, 342 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
5th Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025): WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools -- An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students -- Challenges in adapting an industrial training course for academia - a cybersecurity risk management course case study -- Psychological and Behavioral aspects and system dynam-ics: insights from exercises using a cyber range -- Cybersecurity Micro-credentials and Career Path Design: the Digital4Security Good Practices -- On Demand Cybersecurity Sandboxes Through Kubernetes -- Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 5th International Workshop on Security Testing and Monitoring (STAM 2025): Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions -- LLMs in Security Testing and Monitoring: An Initial Study -- A decentralized PUF-based scheme for Remote Attestation -- Evaluating DAVS Approach for Docker Images Static Analysis -- SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks -- An Intelligent Network Fuzzer with an Application in DICOM Protocol Testing -- Detection of Adversarial Examples by Adversarial Training: a Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks -- NERO Training Methodology and Initial Results. 8th International Workshop on Emerging Network Security (ENS 2025): Proposition of IT platform for combating wildfires with Decision Support System -- Steganographic Channels in Body Area Networks -- SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning -- Real-world Identity and Access Management scenarios simulations in the SILVANUS Project -- 5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-032-00644-8
ISBN:
9783032006448
Availability, reliability and security = ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
Availability, reliability and security
ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.Part II /[electronic resource] :ARES 2025edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter. - Cham :Springer Nature Switzerland :2025. - xxvii, 342 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,159991611-3349 ;. - Lecture notes in computer science ;15999..
5th Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025): WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools -- An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students -- Challenges in adapting an industrial training course for academia - a cybersecurity risk management course case study -- Psychological and Behavioral aspects and system dynam-ics: insights from exercises using a cyber range -- Cybersecurity Micro-credentials and Career Path Design: the Digital4Security Good Practices -- On Demand Cybersecurity Sandboxes Through Kubernetes -- Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 5th International Workshop on Security Testing and Monitoring (STAM 2025): Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions -- LLMs in Security Testing and Monitoring: An Initial Study -- A decentralized PUF-based scheme for Remote Attestation -- Evaluating DAVS Approach for Docker Images Static Analysis -- SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks -- An Intelligent Network Fuzzer with an Application in DICOM Protocol Testing -- Detection of Adversarial Examples by Adversarial Training: a Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks -- NERO Training Methodology and Initial Results. 8th International Workshop on Emerging Network Security (ENS 2025): Proposition of IT platform for combating wildfires with Decision Support System -- Steganographic Channels in Body Area Networks -- SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning -- Real-world Identity and Access Management scenarios simulations in the SILVANUS Project -- 5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities.
This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions. They contain papers of the following workshops: Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025). Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025).
ISBN: 9783032006448
Standard No.: 10.1007/978-3-032-00644-8doiSubjects--Topical Terms:
3790599
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Availability, reliability and security = ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
LDR
:04242nmm a2200373 a 4500
001
2414105
003
DE-He213
005
20250808130302.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783032006448
$q
(electronic bk.)
020
$a
9783032006462
$q
(paper)
024
7
$a
10.1007/978-3-032-00644-8
$2
doi
035
$a
978-3-032-00644-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2025
111
2
$a
International Conference on Availability, Security, and Reliability
$n
(20th :
$d
2025 :
$c
Ghent, Belgium)
$3
3790596
245
1 0
$a
Availability, reliability and security
$h
[electronic resource] :
$b
ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.
$n
Part II /
$c
edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter.
246
3
$a
ARES 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xxvii, 342 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15999
505
0
$a
5th Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025): WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools -- An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students -- Challenges in adapting an industrial training course for academia - a cybersecurity risk management course case study -- Psychological and Behavioral aspects and system dynam-ics: insights from exercises using a cyber range -- Cybersecurity Micro-credentials and Career Path Design: the Digital4Security Good Practices -- On Demand Cybersecurity Sandboxes Through Kubernetes -- Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 5th International Workshop on Security Testing and Monitoring (STAM 2025): Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions -- LLMs in Security Testing and Monitoring: An Initial Study -- A decentralized PUF-based scheme for Remote Attestation -- Evaluating DAVS Approach for Docker Images Static Analysis -- SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks -- An Intelligent Network Fuzzer with an Application in DICOM Protocol Testing -- Detection of Adversarial Examples by Adversarial Training: a Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks -- NERO Training Methodology and Initial Results. 8th International Workshop on Emerging Network Security (ENS 2025): Proposition of IT platform for combating wildfires with Decision Support System -- Steganographic Channels in Body Area Networks -- SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning -- Real-world Identity and Access Management scenarios simulations in the SILVANUS Project -- 5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities.
520
$a
This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions. They contain papers of the following workshops: Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025). Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025).
650
0
$a
Computer security
$v
Congresses.
$3
3790599
650
0
$a
Computers
$x
Reliability
$v
Congresses.
$3
3790600
650
1 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Skopik, Florian.
$3
3514053
700
1
$a
Naessens, Vincent.
$3
3790601
700
1
$a
De Sutter, Bjorn.
$3
3790602
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15999.
$3
3790603
856
4 0
$u
https://doi.org/10.1007/978-3-032-00644-8
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519560
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login