Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Availability, reliability and securi...
~
International Conference on Availability, Security, and Reliability (2025 : )
Linked to FindBook
Google Book
Amazon
博客來
Availability, reliability and security = ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part III /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Availability, reliability and security/ edited by Bart Coppens ... [et al.].
Reminder of title:
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.
remainder title:
ARES 2025
other author:
Coppens, Bart.
corporate name:
International Conference on Availability, Security, and Reliability
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xxv, 366 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11's Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika "AI Companion" Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won't you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-032-00635-6
ISBN:
9783032006356
Availability, reliability and security = ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part III /
Availability, reliability and security
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.Part III /[electronic resource] :ARES 2025edited by Bart Coppens ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xxv, 366 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,159961611-3349 ;. - Lecture notes in computer science ;15996..
18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11's Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika "AI Companion" Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won't you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).
ISBN: 9783032006356
Standard No.: 10.1007/978-3-032-00635-6doiSubjects--Topical Terms:
3790599
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Availability, reliability and security = ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part III /
LDR
:04943nmm a2200373 a 4500
001
2414108
003
DE-He213
005
20250809130201.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783032006356
$q
(electronic bk.)
020
$a
9783032006370
$q
(paper)
024
7
$a
10.1007/978-3-032-00635-6
$2
doi
035
$a
978-3-032-00635-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2025
111
2
$a
International Conference on Availability, Security, and Reliability
$n
(20th :
$d
2025 :
$c
Ghent, Belgium)
$3
3790596
245
1 0
$a
Availability, reliability and security
$h
[electronic resource] :
$b
ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025 : proceedings.
$n
Part III /
$c
edited by Bart Coppens ... [et al.].
246
3
$a
ARES 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xxv, 366 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15996
505
0
$a
18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11's Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika "AI Companion" Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won't you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter.
520
$a
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).
650
0
$a
Computer security
$v
Congresses.
$3
3790599
650
0
$a
Computers
$x
Reliability
$v
Congresses.
$3
3790600
650
1 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Coppens, Bart.
$3
3790597
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15996.
$3
3790607
856
4 0
$u
https://doi.org/10.1007/978-3-032-00635-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519563
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login