| 紀錄類型: |
書目-電子資源
: Monograph/item
|
| 正題名/作者: |
Availability, reliability and security/ edited by Mila Dalla Preda ... [et al.]. |
| 其他題名: |
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings. |
| 其他題名: |
ARES 2025 |
| 其他作者: |
Dalla Preda, Mila. |
| 團體作者: |
International Conference on Availability, Security, and Reliability |
| 出版者: |
Cham :Springer Nature Switzerland : : 2025., |
| 面頁冊數: |
xxi, 433 p. :ill. (some col.), digital ;24 cm. |
| 內容註: |
Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter - Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks. |
| Contained By: |
Springer Nature eBook |
| 標題: |
Computer security - Congresses. - |
| 電子資源: |
https://doi.org/10.1007/978-3-032-00627-1 |
| ISBN: |
9783032006271 |