1.

Record Nr.

UNISA996395495803316

Titolo

The lavvs and acts made in the fourth session of the first Parliament of our most high and dread soveraigns William & Mary, by the grace of God, king and queen of Scotland, England, France, and Ireland, defenders of the faith [[electronic resource] ] : holden and begun at Edinburgh, April 18, 1693 : by His Grace William, Duke of Hamilton ... president of Their Majesties Most Honourable Privy Council and Lord High Admiral of Scotland : Their Majesties high commissioner for holding this Parliament by vertue of a commission under Their Majesties great seal of this kingdom : with the special advice and consent of the estates of Parliament / / collected and extracted from the registers and records of Parliament, by George, Viscount of Tarbat, Lord McLeod, and Castlehaven &c., clerk to Their Majesties Council, Exchequer, registers, and rolls, &c

Pubbl/distr/stampa

Edinburgh, : Printed by the heir of Andrew Anderson, printer to Their Most Excellent Majesties, anno Dom. 1693

Descrizione fisica

[3], 56 [i.e. 54], [9] p

Altri autori (Persone)

CromartyGeorge Mackenzie, Earl of,  <1630-1714.>

Soggetti

Scotland Politics and government 1689-1745

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Error in paging: p. 33-34 omitted from pagination.

Initials, head-piece; title vignette, a crown.

Advertisement: facing t.p.

"Cum privilegio."

Includes "A table of the acts and ratifications past in the fourth session of Their Majesties First Parliament, vvhich are not here printed" on p. [2]-[4] and "Act and ratification in favours of George, Earl of Melvil, June 12, 1693" on p. [5]-[9].

Reproduction of original in: Folger Shakespeare Library.

Sommario/riassunto

eebo-0055



2.

Record Nr.

UNINA9911015682403321

Titolo

Detection of Intrusions and Malware, and Vulnerability Assessment : 22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part II / / edited by Manuel Egele, Veelasha Moonsamy, Daniel Gruss, Michele Carminati

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025

ISBN

3-031-97623-1

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (XVI, 331 p. 104 illus., 92 illus. in color.)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 15748

Disciplina

004.6

Soggetti

Computer networks

Computers

Criminology

Quantum theory

Computer Communication Networks

Computing Milieux

Crime Control and Security

Quantum Physics

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- AI/ML & Security.  -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines.  -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments.  -- Hiding in Plain Sight: On the Robustness of AI-generated code detection.  -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks.  -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains.  -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata.  -- Android & Patches.  -- More Than You Signed Up For: Exposing Gaps in the Validation of Android’s App Signing.  -- An Empirical Study of Multi-Language Security Patches in Open Source Software.  -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS.  -- Poster: SPECK: From Google Textual Guidelines to



Automatic Detection of Android Apps Vulnerabilities.  -- OS & Network.  -- Taming the Linux Memory Allocator for Rapid Prototyping.  -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation.  -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap.  -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs.  -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel.  -- Resilient Systems.  -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification.  -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts.  -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors.  -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation.  -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.

Sommario/riassunto

The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.