LEADER 00990nam a22002651i 4500 001 991000890379707536 005 20021104141213.0 008 021104s1982 it |||||||||||||||||ita 020 $a8885026451 035 $ab12069802-39ule_inst 035 $aARCHE-015960$9ExL 040 $aDip.to Filologia Ling. e Lett.$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a833.8 100 1 $aMeyer, Conrad Ferdinand$0179932 245 13$aIl santo /$cConrad Ferdinand Meyer ; traduzione e note a cura di Gisela Martorelli ; introduzione di Luciano Zagari 260 $aRoma :$bSalerno,$c1982 300 $a195 p. ;$c21 cm 490 0 $aOmikron ;$v14 700 1 $aMartorelli, Gisela 907 $a.b12069802$b28-04-17$c01-04-03 912 $a991000890379707536 945 $aLE008 LLI.S M V 18$g1$i2008000290757$lle008$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12366973$z01-04-03 996 $aSanto$9139336 997 $aUNISALENTO 998 $ale008$b01-04-03$cm$da $e-$fita$git $h3$i1 LEADER 06816nam 22004453 450 001 996594166403316 005 20240503084505.0 010 $a981-9724-58-9 035 $a(CKB)31801769900041 035 $a(MiAaPQ)EBC31302498 035 $a(Au-PeEL)EBL31302498 035 $a(MiAaPQ)EBC31319808 035 $a(Au-PeEL)EBL31319808 035 $a(EXLCZ)9931801769900041 100 $a20240503d2024 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMachine Learning for Cyber Security $e5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings 205 $a1st ed. 210 1$aSingapore :$cSpringer Singapore Pte. Limited,$d2024. 210 4$d©2024. 215 $a1 online resource (186 pages) 225 1 $aLecture Notes in Computer Science Series ;$vv.14541 311 $a981-9724-57-0 327 $aIntro -- Preface -- Organization -- Contents -- Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Keystroke Transcription -- 4.1 Continuous Wavelet Transform -- 4.2 Keystroke Detection and Segmentation -- 4.3 Normalization and Feature Extraction -- 4.4 Keystroke Classification -- 5 Results -- 5.1 Segmentation -- 5.2 Feature Extraction -- 5.3 Classification -- 6 Discussion -- 7 Conclusions -- References -- Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 4 Results and Analysis -- 5 Recommendations -- 6 Conclusion -- References -- PassFile: Graphical Password Authentication Based on File Browsing Records -- 1 Introduction -- 2 Related Work -- 2.1 Graphical Password -- 2.2 Smart Unlock Mechanism -- 3 Our Proposed Scheme -- 4 User Study -- 4.1 Steps and Results -- 4.2 User Feedback -- 5 Discussion on Limitations and Enhancement -- 6 Conclusion -- References -- On the Role of Similarity in Detecting Masquerading Files -- 1 Introduction -- 2 A Taxonomy of Masquerading Files -- 3 Collecting Masquerading Files -- 3.1 Step 1: Building Clustering Model -- 3.2 Step 2: Processing Malware Bazaar -- 3.3 Masquerading Results -- 3.4 The No Signature Case -- 3.5 The Not Verified Case -- 3.6 The Contains a X509 Certificate Case -- 3.7 The Certificate Revoked Case -- 3.8 The Certificate Used for Signing Malware Case -- 3.9 The No Trusted Root Authority Case -- 4 Finding Masquerading Files in Clusters -- 5 Clusters Related to Supply Chain Attacks -- 6 Conclusion and Future Work -- References -- A Password-Based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Complexity Problems. 327 $a3.2 OPAQUE -- 4 System Model and Security Requirements -- 4.1 System Model -- 4.2 Security Requirements -- 5 The Proposed Scheme -- 5.1 Registration of Remote Medical Server -- 5.2 Broadcasting of Service Messages -- 5.3 Registration of User -- 5.4 Authentication and Key Agreement -- 6 Security Analyses -- 7 Performance Evaluation -- 7.1 Some Comparison -- 7.2 Computation Performance -- 7.3 Communication Performance -- 8 Conclusion -- References -- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network in Traffic -- 2.2 Reinforcement Learning in Traffic Signal Timing Optimization -- 3 Methods -- 3.1 Framework Overview -- 3.2 Constructing Traffic Light Directed Adjacency Graph -- 3.3 Calculating the Importance of Adjacent Nodes -- 3.4 Modeling Reinforcement Learning Method -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Datasets -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- A Client-Side Watermarking with Private-Class in Federated Learning -- 1 Introduction -- 2 Related Works -- 2.1 Deep Learning Watermark -- 2.2 Federated Learning Watermark -- 3 Application Scenario and Watermark Requirements -- 3.1 Application Scenario -- 3.2 Watermark Requirements in Federated Learning -- 4 Proposed Method -- 4.1 Watermark Dataset Generation -- 4.2 Watermark Embedding -- 4.3 Watermark Verification -- 5 Experimental Evaluation -- 5.1 Experiment Settings -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Research on Evasion and Detection of Malicious JavaScript Code -- 1 Introduction -- 2 Relative Work -- 2.1 Techniques for Detecting Malicious Code -- 2.2 Taint Analysis Techniques -- 3 Analysis of Features of Malicious JavaScript Code -- 4 Taint Propagation Methods -- 4.1 Forward Taint Propagation. 327 $a4.2 Tracking the Initialization Process of Suspicious Objects -- 4.3 Backward Taint Propagation -- 4.4 Propagation Policies -- 4.5 Discussion on Overtainting and Undertainting Issues -- 5 Theoretical Analysis of the Feasibility of Obfuscation Resistance -- 6 Feature Extraction and Vectorization -- 6.1 Feature Extraction -- 6.2 Vectorization -- 7 Experiments -- 7.1 Dataset and Detection Models -- 7.2 Analysis of Pollution in the Samples -- 7.3 Test Results and Analysis -- 7.4 Comparison with VirusTotal Results -- 8 Conclusion -- References -- Tackling Non-IID for Federated Learning with Components Alignment -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 IID Data Construction -- 2.3 Local Models Assimilation -- 3 FCA: Federated Components Alignment -- 3.1 System -- 3.2 Motivation -- 3.3 Method -- 4 Experimental Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Results -- 4.3 Parameter Configuration -- 5 Summary and Future Work -- References -- Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering -- 1 Introduction -- 2 Our Approach -- 2.1 Goals and Requirements -- 2.2 Design Architecture and Clustering Method -- 2.3 Implementation Details -- 3 Evaluation -- 3.1 Dataset and Pre-processing -- 3.2 Number of Features -- 3.3 Evaluation Results -- 4 Related Work and Discussion -- 4.1 State-of-the-Art -- 4.2 Discussion -- 5 Conclusion -- References -- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability -- 1 Introduction -- 2 Method -- 2.1 Patch the Firmware -- 2.2 Inject the Shellcode to Kernel -- 2.3 Bypass KASLR -- 3 Experiment -- 4 Related Work -- 4.1 Attack on Firmware -- 4.2 Bypass KASLR -- 5 Conclusion -- References -- Author Index. 410 0$aLecture Notes in Computer Science Series 700 $aKim$b Dan Dongseong$01737434 701 $aChen$b Chao$0636283 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996594166403316 996 $aMachine Learning for Cyber Security$94159314 997 $aUNISA LEADER 02451nam 22004213 450 001 9910915703003321 005 20221005132712.0 010 $a3-657-79518-9 035 $a(MiAaPQ)EBC29387189 035 $a(Au-PeEL)EBL29387189 035 $a(CKB)24286240200041 035 $a(NjHacI)9924286240200041 035 $a(EXLCZ)9924286240200041 100 $a20220730d2022 uy 0 101 0 $ager 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWie Katholiken Die Moderne Ökonomie Entdeckten $eRezeptionsweisen in Spätaufklärung und Ultramontanismus 205 $a1st ed. 210 1$aBoston :$cBRILL,$d2022. 210 4$d©2022. 215 $a1 online resource (390 pages) 311 08$aPrint version: Potempa, Alina Wie Katholiken Die Moderne Ökonomie Entdeckten Boston : BRILL,c2022 9783506795182 320 $aIncludes bibliographical references. 330 $aDer Katholizismus des 19. Jahrhunderts konnte mit seinen gesellschaftlichen Herausforderungen und internen Machtka?mpfen ein fruchtbarer Na?hrboden fu?r wirtschaftsliberale Ideen werden. Zu dieser Erkenntnis kommt Alina Potempa, die aufzeigt, wie Katholiken in spa?taufkla?rerischen und ultramontanen Kontexten Adam Smith und die Wissenschaft der Nationalo?konomie rezipierten. Hierzu analysiert sie das wirtschaftspolitische Engagement des katholischen Aufkla?rers Ignaz H. von Wessenberg (1774-1860) im Großherzogtum Baden sowie die ultramontan-katholische Politische O?konomie, die der Jurist und O?konom Charles Pe?rin (1815-1905), Stichwortgeber fu?r die Debatten um einen katholischen »Modernismus«, an der Katholischen Universita?t Leuven (Belgien) unterrichtete. In ihrer Befu?rwortung von Freihandel oder Gewerbefreiheit vermischte sich, so zeigt die Autorin auf, eine o?konomische mit einer religio?sen sowie kirchenpolitischen Positionierung hinsichtlich der dra?ngenden Frage, wie die gesellschaftliche Relevanz des Katholizismus in einer sa?kularen Moderne unter Beweis gestellt werden konnte. 606 $aReligion and politics$zGermany 615 0$aReligion and politics 676 $a303.482430561 700 $aPotempa$b Alina$01778975 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910915703003321 996 $aWie Katholiken Die Moderne Ökonomie Entdeckten$94302234 997 $aUNINA