LEADER 01392nam0-2200409---450- 001 990000528140203316 005 20090715133204.0 010 $a88-387-1894-6 035 $a0052814 035 $aUSA010052814 035 $a(ALEPH)000052814USA01 035 $a0052814 100 $a20010628d2001----y0itay01 ba 101 $aita 102 $aIT 105 $a00||| 200 1 $aContratti e capitolati per appalti privati e pubblici$eregolamento legge quadro sui lavori pubblici (d.P.R. 554/1999)$fMarco Agliata 205 $a4. ed. agg. con regolamento legge quadro sui lavori pubblici (d.P.R. 554/1999)... 210 $aRimini$cMaggioli$dcopyr. 2001 215 $a557 p.$d24 cm$e1 Cd-Rom 225 2 $aAppalti & lavori pubblici$v56 410 0$12001$aAppalti & lavori pubblici 606 $aContratti di appalto 676 $a346.45024 700 1$aAGLIATA,$bMarco$0339131 702 1$aPIACENTINI,$bPier Maria 801 0$aIT$bBNI$c19990610$gRICA 912 $a990000528140203316 951 $aXXV.1.H 288 (IG I 1742)$b30044 G.$cXXV.1.H 288 (IG I)$d00075082 959 $aBK 969 $aGIU 979 $aALESSANDRA$b40$c20010628$lUSA01$h0937 979 $c20020403$lUSA01$h1702 979 $aPATRY$b90$c20040406$lUSA01$h1637 979 $aRSIAV2$b90$c20090715$lUSA01$h1332 996 $aContratti e capitolati per appalti privati e pubblici$9328035 997 $aUNISA LEADER 05471nam 22006255 450 001 9910878069103321 005 20251225195136.0 010 $a3-031-65175-8 024 7 $a10.1007/978-3-031-65175-5 035 $a(MiAaPQ)EBC31569711 035 $a(Au-PeEL)EBL31569711 035 $a(CKB)33428426300041 035 $a(DE-He213)978-3-031-65175-5 035 $a(EXLCZ)9933428426300041 100 $a20240726d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12?14, 2024, Proceedings /$fedited by Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (509 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v710 311 08$a3-031-65174-X 327 $a -- Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- ?Alexa, How Do You Protect My Privacy?? A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference. 330 $aThis book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, held in Edinburgh, UK, during June 12?14, 2024. The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v710 606 $aComputers 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aCryptology 615 0$aComputers. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a004 700 $aPitropakis$b Nikolaos$01751094 701 $aKatsikas$b Sokratis$0597791 701 $aFurnell$b Steven$0846860 701 $aMarkantonakis$b Konstantinos$01743274 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910878069103321 996 $aICT Systems Security and Privacy Protection$94185933 997 $aUNINA