04466nam 22006375 450 991100358820332120250516130314.03-031-92882-210.1007/978-3-031-92882-6(CKB)38815752100041(DE-He213)978-3-031-92882-6(MiAaPQ)EBC32123042(Au-PeEL)EBL32123042(OCoLC)1524424881(EXLCZ)993881575210004120250516d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierICT Systems Security and Privacy Protection 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part I /edited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XIV, 254 p. 77 illus., 60 illus. in color.) IFIP Advances in Information and Communication Technology,1868-422X ;7453-031-92881-4 -- Privacy protection. -- Advanced strategies for privacy preserving data publishing to improve multi class classification. -- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers. -- SAAFL: Secure Aggregation for Label Aware Federated Learning. -- “We’ve met some problems”: Developers’ Issues With Privacy Preserving Computation Techniques on Stack Overflow. -- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis. -- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform. -- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration. -- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage. -- Industrial and Critical Infrastructure Security. -- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic. -- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems. -- Certified Secure Updates for IoT Devices. -- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing. -- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems. -- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects. -- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation. -- SAVA Deployment for Spoofed Source Attacks. -- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).IFIP Advances in Information and Communication Technology,1868-422X ;745ComputersComputer networksCryptographyData encryption (Computer science)Computing MilieuxComputer Communication NetworksCryptologyComputers.Computer networks.Cryptography.Data encryption (Computer science)Computing Milieux.Computer Communication Networks.Cryptology.004Nemec Zlatolas Liliedthttp://id.loc.gov/vocabulary/relators/edtRannenberg Kaiedthttp://id.loc.gov/vocabulary/relators/edtWelzer Tatjanaedthttp://id.loc.gov/vocabulary/relators/edtGarcia-Alfaro Joaquinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9911003588203321ICT Systems Security and Privacy Protection2034030UNINA