LEADER 05567nam 22007575 450 001 9911064740103321 005 20260211120449.0 010 $a3-032-11539-6 024 7 $a10.1007/978-3-032-11539-3 035 $a(CKB)45297238700041 035 $a(MiAaPQ)EBC32546395 035 $a(Au-PeEL)EBL32546395 035 $a(DE-He213)978-3-032-11539-3 035 $a(OCoLC)1574123379 035 $a(EXLCZ)9945297238700041 100 $a20260211d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDependable and Secure Computing $e14th Latin-American Symposium, LADC 2025, Valparaíso, Chile, October 27?31, 2025, Proceedings /$fedited by Luiz Antonio Rodrigues, Rui Oliveira 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (526 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2697 311 08$a3-032-11538-8 327 $a -- Security Foundations and Compliance. -- Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil. -- SPIRE-Based Remote Attestation for Secure VPN Access. -- Towards a Minimum Security Baseline for Cyber-Physical Systems through Security Standards Harmonization. -- Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment. -- AI for Security and Dependability. -- An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment. -- FlowMon: A Workflow-Driven Visual Tool for Automated Monitoring Script Generation. -- Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum-Based LLM Framework. -- Consensus, Cryptography, and Blockchain. -- A Blockchain-Based Architecture for Communication Between Spectrum Access Systems. -- Byzantine Consensus with Secure and Intrusion-Tolerant In-Network Ordering. -- Thetacrypt: A Distributed Service for Threshold Cryptography. -- Modeling and Dependability Evaluation. -- A Practical TLA+ Library for Designing and Verifying Distributed Systems. -- Long-Term Experimental Evaluation of Software Aging Effects in NoSQL Database. -- Advances in Dependable and Secure Computing (Best Paper Candidates). -- Addressing Cryptographic Overheads in Low-Latency File Systems through Ahead-of-Time Encryption. -- Evaluating eBPF as an Alternative to Virtual Machine Introspection for High-Interaction Honeypot Implementation. -- Source Code Vulnerability Detection and Interpretability with Language Models. -- Monitoring and Critical Infrastructures. -- Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach. -- Quantitative Availability Analysis of Fog-Edge Monitoring Architectures in Bus Rapid Transit Station. -- Industry Track. -- Malware Detection in Windows Operating Systems using AI and In-Memory Process Analysis. -- Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach. -- Student Forum. -- Improving Safety in Industry 4.0 using an IoT-Helmet. -- Forecasting-Oriented Management of Software-Defined Fabric Environments. -- Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies. -- Towards Hierarchical Byzantine Distributed Replication. 330 $aThis book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025. The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows: Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track, and Student Forum. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2697 606 $aComputer networks 606 $aComputers, Special purpose 606 $aElectronic digital computers$xEvaluation 606 $aSoftware engineering 606 $aLogic design 606 $aCoding theory 606 $aInformation theory 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aSystem Performance and Evaluation 606 $aSoftware Engineering 606 $aLogic Design 606 $aCoding and Information Theory 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aElectronic digital computers$xEvaluation. 615 0$aSoftware engineering. 615 0$aLogic design. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aSystem Performance and Evaluation. 615 24$aSoftware Engineering. 615 24$aLogic Design. 615 24$aCoding and Information Theory. 676 $a004.6 700 $aRodrigues$b Luiz Antonio$01440000 701 $aRodrigues$01747999 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911064740103321 996 $aDependable and Secure Computing$94545437 997 $aUNINA