LEADER 00839nam0-22002891i-450- 001 990002046390403321 005 20090318124502.0 035 $a000204639 035 $aFED01000204639 035 $a(Aleph)000204639FED01 035 $a000204639 100 $a20030910d1930----km-y0itay50------ba 101 0 $aeng 200 1 $a1. Description of the environment$fP. A. Buxton 210 $aLondon$cBritish Museum$d1930 215 $ap. 1-32$d25 cm 225 1 $aInsects of Samoa and other Samoan Terrestrial Arthropoda$h1$v9 610 0 $aIsole Samoa 676 $a581.2 702 1$aBuxton,$bPatrick A. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002046390403321 952 $a61 V F.6/187.9.1$b6387 (27/05/97)$fDAGEN 959 $aDAGEN 996 $a1. Description of the environment$9406582 997 $aUNINA LEADER 00621nam0-22002411i-450- 001 990002624230403321 005 20050504100320.0 035 $a000262423 035 $aFED01000262423 035 $a(Aleph)000262423FED01 035 $a000262423 100 $a20030910d1962----km-y0itay50------ba 101 0 $aita 200 1 $aCarta dei servizi bancari 210 $aMilano$cGiuffrè$d1962 710 02$aUnioncamere$0422533 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002624230403321 952 $a2-4-17-TI$bn.i.$fECA 959 $aECA 996 $aCarta dei servizi bancari$9432593 997 $aUNINA LEADER 05471nam 22006255 450 001 9910878069103321 005 20251225195136.0 010 $a3-031-65175-8 024 7 $a10.1007/978-3-031-65175-5 035 $a(MiAaPQ)EBC31569711 035 $a(Au-PeEL)EBL31569711 035 $a(CKB)33428426300041 035 $a(DE-He213)978-3-031-65175-5 035 $a(EXLCZ)9933428426300041 100 $a20240726d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12?14, 2024, Proceedings /$fedited by Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (509 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v710 311 08$a3-031-65174-X 327 $a -- Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- ?Alexa, How Do You Protect My Privacy?? A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference. 330 $aThis book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, held in Edinburgh, UK, during June 12?14, 2024. The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v710 606 $aComputers 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aCryptology 615 0$aComputers. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a004 700 $aPitropakis$b Nikolaos$01751094 701 $aKatsikas$b Sokratis$0597791 701 $aFurnell$b Steven$0846860 701 $aMarkantonakis$b Konstantinos$01743274 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910878069103321 996 $aICT Systems Security and Privacy Protection$94185933 997 $aUNINA