LEADER 00803nam a2200229 i 4500 001 991003138099707536 005 20021205125954.0 008 020711s2000 uk ||| | eng 020 $a0747550999 035 $ab11759975-39ule_inst 035 $aLE01283400$9ExL 040 $aDip.to Lingue$bita 100 1 $aRowling, Joanne K$0530509 245 10$aHarry Potter and the Goblet of fire /$cJ.K. Rowling 260 $aLondon :$bBloomsbury,$cc2000 300 $a636 p. ;$c20 cm. 907 $a.b11759975$b21-09-06$c05-12-02 912 $a991003138099707536 945 $aLE012 828.914 ROW$g1$i2012000032651$lle012$o-$pE0.00$q-$rl$s- $t0$u1$v1$w1$x0$y.i12005186$z05-12-02 996 $aHarry Potter and the Goblet of fire$9904717 997 $aUNISALENTO 998 $ale012$b01-01-02$cm$da $e-$feng$guk $h0$i1 LEADER 05684nam 22005055 450 001 996673175303316 005 20250808130245.0 010 $a3-032-00633-3 024 7 $a10.1007/978-3-032-00633-2 035 $a(MiAaPQ)EBC32257308 035 $a(Au-PeEL)EBL32257308 035 $a(CKB)40158936400041 035 $a(DE-He213)978-3-032-00633-2 035 $a(EXLCZ)9940158936400041 100 $a20250808d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAvailability, Reliability and Security $eARES 2025 International Workshops, Ghent, Belgium, August 11?14, 2025, Proceedings, Part II /$fedited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (520 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15995 311 08$a3-032-00632-5 327 $a6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025): SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis -- Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey -- Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment -- Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies -- Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs -- Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems -- Quantum Security Mechanisms for Defense Applications -- Risk-Aware Adaptive Cyber Deception Guided by Large Language Models -- Reducing Information Overload: Because Even Security Experts Need to Blink. First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025): Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications -- Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information -- SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework -- Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats -- 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025): Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA -- Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches -- A Time Series Analysis of Malware Uploads to Programming Language Ecosystems -- A Role Taxonomy in Security-Safety Incident Response -- Promoting Privacy Compliant Data Management in Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model -- Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control -- An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites -- Large-scale security analysis of hardware wallets. 330 $aThis four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025). 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15995 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 700 $aCoppens$b Bart$01840373 701 $aVolckaert$b Bruno$01840374 701 $aNaessens$b Vincent$01840320 701 $aDe Sutter$b Bjorn$01840321 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996673175303316 996 $aAvailability, Reliability and Security$94419896 997 $aUNISA