LEADER 05794nam 22005055 450 001 9910999683703321 005 20250426124656.0 010 $a3-031-89350-6 024 7 $a10.1007/978-3-031-89350-6 035 $a(CKB)38641484300041 035 $a(DE-He213)978-3-031-89350-6 035 $a(MiAaPQ)EBC32029703 035 $a(Au-PeEL)EBL32029703 035 $a(EXLCZ)9938641484300041 100 $a20250426d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRisks and Security of Internet and Systems $e19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings /$fedited by Simon Collart-Dutilleul, Samir Ouchani, Nora Cuppens, Frédéric Cuppens 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XX, 560 p. 145 illus., 128 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15456 311 08$a3-031-89349-2 327 $a -- Abstracts of Invited Talks. -- Horizontal Attack from Theory to Practice. -- Security for Safety Critical Systems in the Railways. -- Security Network Protocols. -- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks. -- Card-Based Secure Evaluation of Decision Trees. -- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach. -- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions. -- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy. -- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0. -- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects. -- AI-Driven Threat Detection. -- On the Properness of Large Language Models for Malware Detection. -- Automated Attack Tree Generation Using Arti?cial Intelligence & Natural Language Processing. -- Classifying Insider Threat Scenarios Through Explainable Arti?cial Intelligence. -- Automated Risk Assessment of Shell-Based Attacks Using a LLM. -- Information Security Management. -- ECU-KM : An E?cient Key Management for In-Vehicle Networks. -- Injecting Bias into Text Classi?cation Models Using Backdoor Attacks. -- Towards New Models of Information Sharing. -- Distributed and Veri?able Digital Badges. -- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design. -- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach. -- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities. -- Applied Cryptography & Privacy. -- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning. -- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT. -- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map. -- Threats Detection & Protection. -- Preventing WebRTC IP Address Leaks. -- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. -- Device Fingerprinting Remediation in Android and iOS Apps. -- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements. -- Risk Identi?cation & Management. -- A Safety Kernel for Flexible Level Crossing Management. -- E?cient Identi?cation of UAVs Through Automatic Communication Frame Linking. -- Enterprise Risk Management in SMEs : Insights from West Africa. -- Blockchain & Distributed Ledger Security. -- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers. -- Modeling and Assessing Coercion Threats in Electronic Voting. -- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme. -- AI for Security Assessment. -- Automated Assessment of the Exploits Using Deep Learning Methods. -- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O?. -- Relevance of Image-Based Representation for Android Malware Detection. 330 $aThis book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024. The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identi?cation & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15456 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aCollart-Dutilleul$b Simon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOuchani$b Samir$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Fre?de?ric$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910999683703321 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNINA