03493nam 22006855 450 991098329890332120251225185120.03-031-75764-510.1007/978-3-031-75764-8(MiAaPQ)EBC31740208(Au-PeEL)EBL31740208(CKB)36393444200041(DE-He213)978-3-031-75764-8(EXLCZ)993639344420004120241023d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInformation Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II /edited by Nicky Mouha, Nick Nikiforakis1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (351 pages)Lecture Notes in Computer Science,1611-3349 ;152583-031-75763-7 Includes bibliographical references and index. -- Web Security. -- JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript. -- Automated Generation of Behavioral Signatures for Malicious Web Campaigns. -- We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts. -- Intrusion Detection. -- TIDL-IDS: A Time-series Imaging and Deep Learning-based IDS for Connected Autonomous Vehicles. -- FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. -- MVDetector: Malicious vehicles detection under Sybil attacks in VANETs. -- Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model.The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.Lecture Notes in Computer Science,1611-3349 ;15258Data protectionComputer engineeringComputer networksCryptographyData encryption (Computer science)Computer networksSecurity measuresData and Information SecurityComputer Engineering and NetworksCryptologyMobile and Network SecurityData protection.Computer engineering.Computer networks.Cryptography.Data encryption (Computer science)Computer networksSecurity measures.Data and Information Security.Computer Engineering and Networks.Cryptology.Mobile and Network Security.005.8Mouha NickyNikiforakis NickMiAaPQMiAaPQMiAaPQBOOK9910983298903321Information Security771885UNINA