LEADER 01100nam a22002773i 4500 001 991001242439707536 005 20250417101752.0 008 040407s1973 it a er 001|0 ita 035 $ab12740548-39ule_inst 035 $aARCHE-072018$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.$dSocioculturale Scs 041 0 $aita 082 04$a967.5$223 100 1 $aFerraresi, Luciano$0130596 245 10$aStoria politica del Congo (Zaire) dall'indipendenza alla rivoluzione di Mulele /$cLuciano Ferraresi 260 $aMilano :$bJaca book,$c1973 300 $a183 p. :$bill. ;$c20 cm 490 1 $aPiccola serie ;$v95/96 651 4$aZaire$xStoria 830 0$aPiccola serie ;$v95/96 907 $a.b12740548$b02-04-14$c16-04-04 912 $a991001242439707536 945 $aLE009 STOR.93-96$g1$i2009000252356$lle009$o-$pE0.00$q-$rl$s-$t0$u2$v1$w2$x0$y.i13276578$z16-04-04 996 $aStoria politica del Congo (Zaire) dall'indipendenza alla rivoluzione di Mulele$9269144 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da$e-$fita$git$h0$i1 LEADER 02961nam 22005055 450 001 9910855382703321 005 20250426005554.0 010 $a9783031575402 010 $a3031575407 024 7 $a10.1007/978-3-031-57540-2 035 $a(CKB)31801674400041 035 $a(DE-He213)978-3-031-57540-2 035 $a(MiAaPQ)EBC31574281 035 $a(Au-PeEL)EBL31574281 035 $a(EXLCZ)9931801674400041 100 $a20240821d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e16th International Symposium, FPS 2023, Bordeaux, France, December 11?13, 2023, Revised Selected Papers, Part II /$fedited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (XIX, 106 p. 33 illus., 19 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14552 311 08$a9783031575396 311 08$a3031575393 320 $aIncludes bibliographical references and index. 327 $aShort Papers -- UCAT: the Uniform Categorization for Access Control -- Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach -- Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection -- Evaluating Deep Learning for Cross-Domains Fake News Detection -- Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting -- Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication -- SADIS: real-time sound-based anomaly detection for industrial systems -- A resilience Component for a Digital Twin. 330 $aThis book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11?13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14552 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aMosbah$b Mohamed 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910855382703321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA