1.

Record Nr.

UNINA990005988190403321

Titolo

Le Fonds agraire : historique d'un essai de réglement du conflit international relatif aux rèformes agraires en Europe Central : execution des accords de la Haje du 20-1-1930 et de Paris du 28-4-1930

Pubbl/distr/stampa

Alençon : Imp. Alenconnaise Maison Coulet Malassis, 1950

Disciplina

343.076

Locazione

FGBC

Collocazione

VIII B 275

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910999683703321

Titolo

Risks and Security of Internet and Systems : 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings / / edited by Simon Collart-Dutilleul, Samir Ouchani, Nora Cuppens, Frédéric Cuppens

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

3-031-89350-6

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (XX, 560 p. 145 illus., 128 illus. in color.)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 15456

Disciplina

005.8

Soggetti

Data protection

Data and Information Security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- Abstracts of Invited Talks.  -- Horizontal Attack from Theory to Practice.  -- Security for Safety Critical Systems in the Railways.  -- Security Network Protocols.  -- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.  -- Card-Based Secure Evaluation of Decision Trees.  -- FREIDA : A Concrete Tool for



Reproducible Evaluation of IDS Using a Data-Driven Approach.  -- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.  -- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.  -- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.  -- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.  -- AI-Driven Threat Detection.  -- On the Properness of Large Language Models for Malware Detection.  -- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing.  -- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence.  -- Automated Risk Assessment of Shell-Based Attacks Using a LLM.  -- Information Security Management.  -- ECU-KM : An Efficient Key Management for In-Vehicle Networks.  -- Injecting Bias into Text Classification Models Using Backdoor Attacks.  -- Towards New Models of Information Sharing.  -- Distributed and Verifiable Digital Badges.  -- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.  -- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.  -- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.  -- Applied Cryptography & Privacy.  -- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.  -- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.  -- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.  -- Threats Detection & Protection.  -- Preventing WebRTC IP Address Leaks.  -- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.  -- Device Fingerprinting Remediation in Android and iOS Apps.  -- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.  -- Risk Identification & Management.  -- A Safety Kernel for Flexible Level Crossing Management.  -- Efficient Identification of UAVs Through Automatic Communication Frame Linking.  -- Enterprise Risk Management in SMEs : Insights from West Africa.  -- Blockchain & Distributed Ledger Security.  -- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.  -- Modeling and Assessing Coercion Threats in Electronic Voting.  -- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.  -- AI for Security Assessment.  -- Automated Assessment of the Exploits Using Deep Learning Methods.  -- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-Off.  -- Relevance of Image-Based Representation for Android Malware Detection.

Sommario/riassunto

This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024. The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.