00755nam0-22002891i-450-99000326565040332120001010000326565FED01000326565(Aleph)000326565FED0100032656520000920d196122km-y0itay50------baitay-------001yy<<L'>>EQUIPEMENT PETROLIER EN EUROPEParisOece1961 (2 volume) (2 copie)pp. 321Fonti Energetiche050.004ITUNINARICAUNIMARCBK990003265650403321050.004.EQU35910/22924DECGEDECGEEQUIPEMENT PETROLIER EN EUROPE450437UNINAING0101590nam2 2200337 i 450 CFI054787320231121125454.08884023769IT2003-5785 20080320d2002 ||||0itac50 baitaitz01i xxxe z01n˜18: œEpistolario, 1816-1817. Tomo 1.Antonio Canovaa cura di Hugh Honour e Paolo MariuzRomaSalerno\2002!LIV, 593 p.25 cm.001VIA00446582001 Edizione nazionale delle opere di Antonio Canova18856.721Canova, Antonio <1757-1822>CFIV01695207083471Honour, HughBVEV003055Mariuz, PaoloVEAV041922ITIT-0120080320IT-RM0418 IT-FR0017 BIBLIOTECA ACCADEMIA NAZ. DEI LINCEI E CORSINIANARM0418 Biblioteca umanistica Giorgio ApreaFR0017 CFI0547873Biblioteca umanistica Giorgio Aprea 52CIS 11/7.2 52VM 0000386525 VM barcode:00067744. - Inventario:32789 FLSVMA 2008112020121204 52CIS 11/7.1* 52VM 0000386515 VM barcode:00067745. - Inventario:32788 FLSVMA 2008112020121204 52CIS 11/7.1 52VM 0000386505 VM barcode:00002199. - Inventario:26360 FLSVMA 2004012720121204 10 52Epistolario, 1816-1817. Tomo 11402986UNICAS05045nam 22006255 450 991085538220332120250426010141.09783031575372303157537710.1007/978-3-031-57537-2(CKB)31801666800041(MiAaPQ)EBC31305359(Au-PeEL)EBL31305359(DE-He213)978-3-031-57537-2(MiAaPQ)EBC31574280(Au-PeEL)EBL31574280(EXLCZ)993180166680004120240424d2024 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierFoundations and Practice of Security 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I /edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (468 pages)Lecture Notes in Computer Science,1611-3349 ;145519783031575365 3031575369 Includes bibliographical references and index.AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World–Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11–13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. .Lecture Notes in Computer Science,1611-3349 ;14551Data protectionComputer engineeringComputer networksData and Information SecurityComputer Engineering and NetworksComputer Communication NetworksData protection.Computer engineering.Computer networks.Data and Information Security.Computer Engineering and Networks.Computer Communication Networks.005.8Mosbah MohamedMiAaPQMiAaPQMiAaPQBOOK9910855382203321Foundations and Practice of Security4159644UNINA