LEADER 05240nam 22007455 450 001 9911011817503321 005 20250627131025.0 010 $a3-031-93354-0 024 7 $a10.1007/978-3-031-93354-7 035 $a(MiAaPQ)EBC32182242 035 $a(Au-PeEL)EBL32182242 035 $a(CKB)39476258800041 035 $a(DE-He213)978-3-031-93354-7 035 $a(EXLCZ)9939476258800041 100 $a20250627d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Cyber-Physical Systems and Smart Vehicles $eSecond EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7?8, 2024, Proceedings /$fedited by Xiali Hei, Luis Garcia, Taegyu Kim, Kyungtae Kim 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (465 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v622 311 08$a3-031-93353-2 327 $aEmerging Applications -- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics -- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing -- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer -- Security Techniques for Cyber-Physical Systems -- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots -- Software Bill of Materials Management for Embedded Vehicle Systems -- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement -- A Case Study of API Design for Interoperability and Security of the Internet of Things -- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments -- Hardware and Firmware Security -- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair -- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network -- RustBound: Function Boundary Detection over Rust Stripped Binaries -- Adversarial Attacks in Autonomous Systems -- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving -- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study -- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles -- Ethics, Privacy, and Human-Centric Considerations -- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment -- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles -- Privacy-Enrooted Car Systems (PECS): Preliminary Design -- Demos -- Demo: All-in-One Solution for Online Abuse Research. 330 $aThis book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7?8, 2024. The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v622 606 $aApplication software 606 $aComputer systems 606 $aTelecommunication 606 $aComputer networks 606 $aComputers, Special purpose 606 $aArtificial intelligence 606 $aComputer and Information Systems Applications 606 $aComputer System Implementation 606 $aCommunications Engineering, Networks 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aArtificial Intelligence 615 0$aApplication software. 615 0$aComputer systems. 615 0$aTelecommunication. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aArtificial intelligence. 615 14$aComputer and Information Systems Applications. 615 24$aComputer System Implementation. 615 24$aCommunications Engineering, Networks. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aArtificial Intelligence. 676 $a005.3 700 $aHei$b Xiali$01059586 701 $aGarcia$b Luis$0619109 701 $aKim$b Taegyu$01831900 701 $aKim$b Kyungtae$01831901 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911011817503321 996 $aSecurity and Privacy in Cyber-Physical Systems and Smart Vehicles$94404890 997 $aUNINA LEADER 02868nam 22006134a 450 001 9910960740903321 005 20200520144314.0 010 $a0-8135-5596-5 010 $a0-8135-3649-9 035 $a(CKB)1000000000031404 035 $a(EBL)3032132 035 $a(SSID)ssj0000140476 035 $a(PQKBManifestationID)11163024 035 $a(PQKBTitleCode)TC0000140476 035 $a(PQKBWorkID)10054813 035 $a(PQKB)10379514 035 $a(MiAaPQ)EBC3032132 035 $a(Au-PeEL)EBL3032132 035 $a(CaPaEBR)ebr10075387 035 $a(OCoLC)57056167 035 $a(BIP)77575950 035 $a(BIP)8789278 035 $a(EXLCZ)991000000000031404 100 $a20030623d2004 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDo you really need surgery? $ea sensible guide to hysterectomy and other procedures for women /$fMichele C. Moore, Caroline M. de Costa 205 $a1st ed. 210 $aNew Brunswick, N.J. $cRutgers University Press$dc2004 215 $a1 online resource (xiv, 171 pages) $cillustrations 300 $aDescription based upon print version of record. 311 0 $a0-8135-3392-9 320 $aIncludes bibliographical references (p. [165]-166) and index. 327 $aYour anatomy: where things are -- Your physiology : how things work -- What goes wrong : some common gynecologic diseases and problems -- What goes wrong : cancers -- Reaching a diagnosis: what to expect -- Non-surgical treatment of gyn problems -- Surgical treatment: "traditional" or open procedures -- Traditional hysterectomy: what to expect -- Traditional surgery: the risks -- After the surgery -- Other gynecologic surgery and treatments -- Laparoscopic surgery -- Risks of laparoscopy -- Laparoscopic surgery: how will you feel? -- Surgical choices -- Other 'Endoscopic' Surgery -- Tips to Help Make a Sensible Decision. 330 $aA user-friendly guide to gynaecologic surgery. The authors' guiding principle is that each woman for whom any kind of surgery is recommended should be well-informed about the indications, the risks and the expected results. Only with such knowledge can a woman make a sensible decision for herself. 606 $aGenerative organs, Female$xSurgery$vPopular works 606 $aGynecology$vPopular works 606 $aWomen$xHealth and hygiene 615 0$aGenerative organs, Female$xSurgery 615 0$aGynecology 615 0$aWomen$xHealth and hygiene. 676 $a618.1/059 700 $aMoore$b Michele$01791303 701 $aDe Costa$b Caroline$f1947-$01871973 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910960740903321 996 $aDo you really need surgery$94481008 997 $aUNINA