LEADER 04466nam 22006375 450 001 9911003588203321 005 20250516130314.0 010 $a3-031-92882-2 024 7 $a10.1007/978-3-031-92882-6 035 $a(CKB)38815752100041 035 $a(DE-He213)978-3-031-92882-6 035 $a(MiAaPQ)EBC32123042 035 $a(Au-PeEL)EBL32123042 035 $a(OCoLC)1524424881 035 $a(EXLCZ)9938815752100041 100 $a20250516d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21?23, 2025, Proceedings, Part I /$fedited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XIV, 254 p. 77 illus., 60 illus. in color.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v745 311 08$a3-031-92881-4 327 $a -- Privacy protection. -- Advanced strategies for privacy preserving data publishing to improve multi class classification. -- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers. -- SAAFL: Secure Aggregation for Label Aware Federated Learning. -- ?We?ve met some problems?: Developers? Issues With Privacy Preserving Computation Techniques on Stack Overflow. -- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis. -- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform. -- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration. -- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage. -- Industrial and Critical Infrastructure Security. -- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic. -- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems. -- Certified Secure Updates for IoT Devices. -- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing. -- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems. -- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects. -- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation. -- SAVA Deployment for Spoofed Source Attacks. -- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements. 330 $aThe two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025). 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v745 606 $aComputers 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputing Milieux 606 $aComputer Communication Networks 606 $aCryptology 615 0$aComputers. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aComputing Milieux. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a004 702 $aNemec Zlatolas$b Lili$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRannenberg$b Kai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWelzer$b Tatjana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911003588203321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA