01539nam0 2200325 i 450 CFI006570820231121125432.0IT88-8408 20210226d1987 ||||0itac50 baitaitz01i xxxe z01nLa stazione sismologica dell'Università di Salerno nella valle dell'IrnoSalvatore De Martino ... \et al.!Napoli \ecc.!Edizioni scientifiche italiane198772 p.ill.24 cm.Pubblicazioni dell'Università degli studi di Salerno. Sezione di studi di scienze naturali, fisiche, matematiche e tecnologiche2001CFI00657142001 Pubblicazioni dell'Università degli studi di Salerno. Sezione di studi di scienze naturali, fisiche, matematiche e tecnologiche271202Università degli studi di SalernoCFIV002235Stazioni sismologicheFIRRMLC383998I551.2209457421De Martino, SalvatoreCFIV041528GenuinusRMLV051997De Martino, SalvatoreITIT-0120210226IT-FR0017 Biblioteca umanistica Giorgio ApreaFR0017 NCFI0065708Biblioteca umanistica Giorgio Aprea 52MAG 6/1435 52BUN0000129485 VMB RS A 2021022620210226 52Stazione sismologica dell'Università di Salerno nella Valle dell'Irno973156UNICAS01255nam 2200337 450 99657541120331620230417154225.01-5386-8158-7(CKB)4100000009587257(NjHacI)994100000009587257(EXLCZ)99410000000958725720230417d2019 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrier2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) /Institute of Electrical and Electronics Engineers[Place of publication not identified] :Institute of Electrical and Electronics Engineers,2019.1 online resource1-5386-8159-5 2019 IEEE International Conference on Electrical, Computer and Communication Technologies Telecommunication systemsCongressesTelecommunication systems621.382NjHacINjHaclPROCEEDING9965754112033162019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT)2516149UNISA06353nam 22006495 450 99666036510331620250501130223.03-031-87499-410.1007/978-3-031-87499-4(CKB)38696351800041(DE-He213)978-3-031-87499-4(MiAaPQ)EBC32068859(Au-PeEL)EBL32068859(OCoLC)1524420812(EXLCZ)993869635180004120250501d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierFoundations and Practice of Security 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I /edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XVI, 416 p. 113 illus., 79 illus. in color.) Lecture Notes in Computer Science,1611-3349 ;155323-031-87498-6 -- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System’s Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM.This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09–11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.Lecture Notes in Computer Science,1611-3349 ;15532Data protectionComputer engineeringComputer networksData and Information SecurityComputer Engineering and NetworksComputer Communication NetworksData protection.Computer engineering.Computer networks.Data and Information Security.Computer Engineering and Networks.Computer Communication Networks.005.8Adi Kameledthttp://id.loc.gov/vocabulary/relators/edtBourdeau Simonedthttp://id.loc.gov/vocabulary/relators/edtDurand Christeledthttp://id.loc.gov/vocabulary/relators/edtViet Triem Tong Valérieedthttp://id.loc.gov/vocabulary/relators/edtDulipovici Alinaedthttp://id.loc.gov/vocabulary/relators/edtKermarrec Yvonedthttp://id.loc.gov/vocabulary/relators/edtGarcia-Alfaro Joaquinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996660365103316Foundations and Practice of Security4159644UNISA