LEADER 00922nam a2200265 i 4500 001 991000582509707536 005 20020509172534.0 008 951212s1995 it 000 0 ita d 020 $a8820490749 035 $ab11379947-39ule_inst 035 $aPARLA211360$9ExL 040 $aDip.to Scienze pedagogiche$bita 100 1 $aPozzi, Alberto$0458157 245 13$aLe tecniche di memoria :$bcorso rapido d'apprendimento /$cAlberto Pozzi 250 $a10. ed. 260 $aMilano :$bFranco Angeli,$c1995 300 $a103 p. ;$c21 cm 490 0 $aTrend / Le guide in un mondo che cambia 650 4$aMemoria 907 $a.b11379947$b01-03-17$c01-07-02 912 $a991000582509707536 945 $aLE022 MP 82 I 24$g1$i2022000148061$lle022$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11563394$z01-07-02 996 $aTecniche di memoria$9173245 997 $aUNISALENTO 998 $ale022$b01-01-95$cm$da $e-$fita$git $h3$i1 LEADER 04980nam 22004935 450 001 996673179603316 005 20250809130207.0 010 $a3-032-00642-2 024 7 $a10.1007/978-3-032-00642-4 035 $a(MiAaPQ)EBC32257404 035 $a(Au-PeEL)EBL32257404 035 $a(CKB)40158929000041 035 $a(DE-He213)978-3-032-00642-4 035 $a(EXLCZ)9940158929000041 100 $a20250809d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAvailability, Reliability and Security $eARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11?14, 2025, Proceedings, Part I /$fedited by Florian Skopik, Vincent Naessens, Bjorn De Sutter 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (522 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15998 311 08$a3-032-00641-4 327 $a5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025): FL-AdvGNN: A Federated Privacy-Preserving Framework of Adversarial Graph Neural Networks -- Digital twin technology for sustainable shipping: establishing cyber-security challenges and opportunities -- Red vs. Blue Team Training Scenarios for 5G/6G Networks -- LLM-Enhanced Intrusion Detection for Containerized Applications: A Two-tier Strategy for SDN and Kubernetes Environments -- A Cyber-Resilient DICE Architecture for Resource-Constrained Devices -- NullJack: An open approach for undetectable ethernet port scanning -- Group Signatures for Secure and Reliable Industrial Data Collaboration -- Real-time digital ecosystems: Integrating Virtual Personas and Digital Twins through Microservices -- Behind Enemy Lines: Strengthening Android Malware Detection with Adversarial Training. 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025): Novel approximations of elementary functions in zero-knowledge proofs -- Relaxing the Single Point of Failure in Quantum Key Distribution Networks: an Overview of Multi-Path Approaches -- b4M: Holistic Benchmarking for MPC -- A Cloud-based Multifactor Authentication Scheme Using Post-Quantum Cryptography and Trusted Execution Environments. First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025): Data Poisoning in FL: Clipping Malicious Updates -- Supporting Human-Robot Collaboration and Safety with the Proposed Explainable Neuro-symbolic Reasoning -- Towards a Metric to Assess Neural Network Resilience Against Adversarial Samples -- Evaluating Fine-Tuned LLMs for AI Text Detection. 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025): Side-Channel Analysis of OpenVINO-based Neural Network Models -- Optimizing IoT Attack Detection in Edge AI: A Comparison of Lightweight Machine Learning and Feature Reduction Techniques -- Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation Compliance -- Integrating Quantum Key Distribution into Academic Network: Practical Challenges and Solutions -- Kerberos-Authenticated Classical Channel for Quantum Key Distribution: A Symmetric-Key Approach to Quantum-Safe Authentication. 330 $aThis two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions. They contain papers of the following workshops: Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025). Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025). 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15998 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 700 $aSkopik$b Florian$0867233 701 $aNaessens$b Vincent$01840320 701 $aDe Sutter$b Bjorn$01840321 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996673179603316 996 $aAvailability, Reliability and Security$94419873 997 $aUNISA