Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Availability, reliability and securi...
~
International Conference on Availability, Security, and Reliability (2025 : )
Linked to FindBook
Google Book
Amazon
博客來
Availability, reliability and security = 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part I /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Availability, reliability and security/ edited by Mila Dalla Preda ... [et al.].
Reminder of title:
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.
remainder title:
ARES 2025
other author:
Dalla Preda, Mila.
corporate name:
International Conference on Availability, Security, and Reliability
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xxvii, 439 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-032-00624-0
ISBN:
9783032006240
Availability, reliability and security = 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part I /
Availability, reliability and security
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.Part I /[electronic resource] :ARES 2025edited by Mila Dalla Preda ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xxvii, 439 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,159921611-3349 ;. - Lecture notes in computer science ;15992..
Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models.
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.
ISBN: 9783032006240
Standard No.: 10.1007/978-3-032-00624-0doiSubjects--Topical Terms:
3790599
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Availability, reliability and security = 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part I /
LDR
:03887nmm a2200373 a 4500
001
2414111
003
DE-He213
005
20250810130204.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783032006240
$q
(electronic bk.)
020
$a
9783032006233
$q
(paper)
024
7
$a
10.1007/978-3-032-00624-0
$2
doi
035
$a
978-3-032-00624-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2025
111
2
$a
International Conference on Availability, Security, and Reliability
$n
(20th :
$d
2025 :
$c
Ghent, Belgium)
$3
3790596
245
1 0
$a
Availability, reliability and security
$h
[electronic resource] :
$b
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.
$n
Part I /
$c
edited by Mila Dalla Preda ... [et al.].
246
3
$a
ARES 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xxvii, 439 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15992
505
0
$a
Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models.
520
$a
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.
650
0
$a
Computer security
$v
Congresses.
$3
3790599
650
0
$a
Computers
$x
Reliability
$v
Congresses.
$3
3790600
650
1 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Dalla Preda, Mila.
$3
3790604
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15992.
$3
3790610
856
4 0
$u
https://doi.org/10.1007/978-3-032-00624-0
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519566
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login