04740nam 22006375 450 99666455280331620250619125348.03-031-87496-X10.1007/978-3-031-87496-3(MiAaPQ)EBC32163413(Au-PeEL)EBL32163413(CKB)39395926500041(DE-He213)978-3-031-87496-3(EXLCZ)993939592650004120250619d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierFoundations and Practice of Security 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II /edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (319 pages)Lecture Notes in Computer Science,1611-3349 ;155333-031-87495-1 -- Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace. -- Another Walk for Monchi. -- An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments. -- Privacy-Preserving Machine Learning Inference for Intrusion Detection. -- Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers. -- Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats. -- LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. -- Intelligent Green Efficiency for Intrusion Detection. -- A Privacy-Preserving Behavioral Authentication System. -- Automated Exploration of Optimal Neural Network Structures for Deepfake Detection. -- An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset. -- New trends of machine leaning and AI applied to cybersecurity. -- ModelForge: Using GenAI to Improve the Development of Security Protocols. -- Detecting Energy Attacks in the Battery-less Internet of Things . -- Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection. -- ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation.This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09–11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.Lecture Notes in Computer Science,1611-3349 ;15533Data protectionComputer engineeringComputer networksData and Information SecurityComputer Engineering and NetworksComputer Communication NetworksData protection.Computer engineering.Computer networks.Data and Information Security.Computer Engineering and Networks.Computer Communication Networks.005.8Adi Kamel1830278Bourdeau Simon1830279Durand Christel1830280Viet Triem Tong Valérie1830281Dulipovici Alina1830282Kermarrec Yvon1759786Garcia-Alfaro Joaquin1731903MiAaPQMiAaPQMiAaPQBOOK996664552803316Foundations and Practice of Security4400573UNISA