LEADER 01113nas# 22003011i 450 001 UON00505274 005 20231205105432.941 011 $a0028-2677 017 70$2P$aP 00056381 100 $a20210326a1916 |0itac50 ba 101 $amul 102 $aNL 105 $a|||| ||||| 110 $aaQ||||||||| 200 1 $aNeophilologus$eA quarterly devoted to the study of the modern languages and their literatures and the classical languages and literatures, etc 210 $a1(1916)- 215 $aGroningen$cSpringer, 1916-. 606 $aFILOLOGIA$xPeriodici$3UONC081640$2FI 620 $aNL$dGroningen$3UONL000213 676 $a410$cLinguistica$v21 676 $a805$cSeriali di letteratura$v21 712 $aSpringer$3UONV283843$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI$41916-1921;1923-1979;1981; Lac.:1959;1975-1979;1981;$cPER DUOMO 413 ; 912 $aUON00505274 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$bSI 1916-1921;1923-1979;1981; Lac.:1959;1975-1979;1981; 996 $aNeophilologus$9792697 997 $aUNIOR LEADER 06355nam 22006495 450 001 9911001465803321 005 20250501130223.0 010 $a3-031-87499-4 024 7 $a10.1007/978-3-031-87499-4 035 $a(CKB)38696351800041 035 $a(DE-He213)978-3-031-87499-4 035 $a(MiAaPQ)EBC32068859 035 $a(Au-PeEL)EBL32068859 035 $a(OCoLC)1524420812 035 $a(EXLCZ)9938696351800041 100 $a20250501d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9?11, 2024, Revised Selected Papers, Part I /$fedited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XVI, 416 p. 113 illus., 79 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15532 311 08$a3-031-87498-6 327 $a -- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System?s Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM. 330 $aThis two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09?11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15532 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aAdi$b Kamel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBourdeau$b Simon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDurand$b Christel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aViet Triem Tong$b Valérie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDulipovici$b Alina$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKermarrec$b Yvon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911001465803321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA