LEADER 04367nam 22005055 450 001 996673177403316 005 20250810130204.0 010 $a3-032-00624-4 024 7 $a10.1007/978-3-032-00624-0 035 $a(MiAaPQ)EBC32257391 035 $a(Au-PeEL)EBL32257391 035 $a(CKB)40158920600041 035 $a(DE-He213)978-3-032-00624-0 035 $a(EXLCZ)9940158920600041 100 $a20250810d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAvailability, Reliability and Security $e20th International Conference, ARES 2025, Ghent, Belgium, August 11?14, 2025, Proceedings, Part I /$fedited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (649 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15992 311 08$a3-032-00623-6 327 $aPrivacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models. 330 $aThis two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15992 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 700 $aDalla Preda$b Mila$01840318 701 $aSchrittwieser$b Sebastian$01840319 701 $aNaessens$b Vincent$01840320 701 $aDe Sutter$b Bjorn$01840321 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996673177403316 996 $aAvailability, Reliability and Security$94419860 997 $aUNISA