LEADER 01320nam a2200337 i 4500 001 991000938769707536 005 20020507104126.0 008 980302s1992 us ||| | eng 020 $a0201554410 035 $ab10150894-39ule_inst 035 $aLE00639442$9ExL 040 $aDip.to Fisica$bita 084 $a53.1.65 084 $a533'.2 084 $aQC133.T84 100 1 $aTufillaro, Nicholas B.$022252 245 13$aAn experimental approach to nonlinear dynamics and chaos /$cNicholas B. Tufillaro, Tyler Abbott, Jeremiah Reilly 260 $aRedwood City, CA :$bAddison Wesley Publ. Co.,$c1992 300 $axiv, 340 p. ;$c24 cm. 490 0 $aAddison-Wesley studies in nonlinearity 500 $aIncludes bibliographical references. 500 $aSoftware for Macintosh computers included. 650 4$aChaotic behavior in systems 700 1 $aAbbott, Tyler$eauthor$4http://id.loc.gov/vocabulary/relators/aut$022253 700 1 $aReilly, Jeremiah 907 $a.b10150894$b17-02-17$c27-06-02 912 $a991000938769707536 945 $aLE006 53.1.65 TUF$g1$i2006000068796$lle006$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10180813$z27-06-02 996 $aExperimental approach to nonlinear dynamics and chaos$91444817 997 $aUNISALENTO 998 $ale006$b01-01-98$cm$da $e-$feng$gus $h3$i1 LEADER 04740nam 22006375 450 001 996664552803316 005 20250619125348.0 010 $a3-031-87496-X 024 7 $a10.1007/978-3-031-87496-3 035 $a(MiAaPQ)EBC32163413 035 $a(Au-PeEL)EBL32163413 035 $a(CKB)39395926500041 035 $a(DE-He213)978-3-031-87496-3 035 $a(EXLCZ)9939395926500041 100 $a20250619d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFoundations and Practice of Security $e17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9?11, 2024, Revised Selected Papers, Part II /$fedited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (319 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15533 311 08$a3-031-87495-1 327 $a -- Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace. -- Another Walk for Monchi. -- An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments. -- Privacy-Preserving Machine Learning Inference for Intrusion Detection. -- Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers. -- Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats. -- LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. -- Intelligent Green Efficiency for Intrusion Detection. -- A Privacy-Preserving Behavioral Authentication System. -- Automated Exploration of Optimal Neural Network Structures for Deepfake Detection. -- An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset. -- New trends of machine leaning and AI applied to cybersecurity. -- ModelForge: Using GenAI to Improve the Development of Security Protocols. -- Detecting Energy Attacks in the Battery-less Internet of Things . -- Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection. -- ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation. 330 $aThis two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09?11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15533 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aAdi$b Kamel$01830278 701 $aBourdeau$b Simon$01830279 701 $aDurand$b Christel$01830280 701 $aViet Triem Tong$b Valérie$01830281 701 $aDulipovici$b Alina$01830282 701 $aKermarrec$b Yvon$01759786 701 $aGarcia-Alfaro$b Joaquin$01731903 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996664552803316 996 $aFoundations and Practice of Security$94400573 997 $aUNISA