top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Computer crimes
Law and legislation
Data encryption (Computer science)
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Crime
Legal Aspects of Computing
Cryptology
ISBN 3-030-42051-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019).
Record Nr. UNINA-9910380748003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Computer crimes
Law and legislation
Data encryption (Computer science)
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Crime
Legal Aspects of Computing
Cryptology
ISBN 3-030-42051-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019).
Record Nr. UNISA-996418207003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Autore Katsikas Sokratis
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (785 pages)
Disciplina 005.8
Altri autori (Persone) AbieHabtamu
RaniseSilvio
VerderameLuca
CambiasoEnrico
UgarelliRita
PraçaIsabel
LiWenjuan
MengWeizhi
FurnellSteven
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computers
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Cryptology
Computing Milieux
Computer Engineering and Networks
Data and Information Security
Computer Communication Networks
ISBN 3-031-54129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification.
4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives.
5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee.
Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study.
3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger.
Record Nr. UNINA-9910842491003321
Katsikas Sokratis  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Autore Katsikas Sokratis
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (785 pages)
Disciplina 005.8
Altri autori (Persone) AbieHabtamu
RaniseSilvio
VerderameLuca
CambiasoEnrico
UgarelliRita
PraçaIsabel
LiWenjuan
MengWeizhi
FurnellSteven
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computers
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Cryptology
Computing Milieux
Computer Engineering and Networks
Data and Information Security
Computer Communication Networks
ISBN 3-031-54129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification.
4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives.
5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee.
Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study.
3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger.
Record Nr. UNISA-996589546603316
Katsikas Sokratis  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XI, 365 p. 89 illus.)
Disciplina 025.04
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Information storage and retrieval
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Information Storage and Retrieval
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
ISBN 3-319-41483-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost.
Record Nr. UNINA-9910484677003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Data and Applications Security and Privacy XXX [[electronic resource] ] : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings / / edited by Silvio Ranise, Vipin Swarup
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XI, 365 p. 89 illus.)
Disciplina 025.04
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Information storage and retrieval
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Information Storage and Retrieval
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
ISBN 3-319-41483-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile security and privacy -- Security and privacy in databases -- Access Control -- Protection and privacy of data and big data -- Security and privacy in social networks and collaborative systems -- Reasoning about security and its cost.
Record Nr. UNISA-996465955803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Frontiers of Combining Systems [[electronic resource] ] : 10th International Symposium, FroCoS 2015, Wroclaw, Poland, September 21-24, 2015, Proceedings / / edited by Carsten Lutz, Silvio Ranise
Frontiers of Combining Systems [[electronic resource] ] : 10th International Symposium, FroCoS 2015, Wroclaw, Poland, September 21-24, 2015, Proceedings / / edited by Carsten Lutz, Silvio Ranise
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 357 p. 54 illus. in color.)
Disciplina 511.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Mathematical logic
Computer logic
Computer programming
Artificial Intelligence
Mathematical Logic and Formal Languages
Logics and Meanings of Programs
Programming Techniques
ISBN 3-319-24246-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Contents -- Invited Talk -- Free Variables and Theories: Revisiting Rigid E-Unification -- 1 Introduction -- 2 Background -- 2.1 Rigid E-Unification -- 2.2 Subterm Instantiation and Bounded Rigid E-Unification -- 2.3 Bounded Rigid E-Unification Formally -- 3 Semantically Solving BREU -- 3.1 Semantic Solvability in a First-Order Calculus -- 3.2 The Complexity of Semantic Solvability -- 4 Towards Bounded Rigid Theory Unification -- 5 Challenges and Conclusion -- Description Logics -- Decidable Description Logics of Context with Rigid Roles -- 1 Introduction -- 2 Basic Notions -- 3 Complexity of the Consistency Problem -- 4 The Case of EL: LM[[EL]] and EL[[LO]] -- 5 Conclusions -- Adding Threshold Concepts to the Description Logic EL -- 1 Introduction -- 2 The Description Logic EL -- 3 The Logic EL(m) -- 4 The Membership Function deg -- 5 Reasoning in EL(deg) -- 6 Concept Similarity and Relaxed Instance Queries -- 7 Conclusion -- Reasoning in Expressive Description Logicsunder Infinitely Valued Gödel Semantics -- 1 Introduction -- 2 Preliminaries -- 3 Automata for Complex Role Inclusions -- 4 The Reduction -- 5 Conclusions -- References -- Theorem Proving and Model Building -- NRCL - A Model Building Approach to the Bernays-Schönfinkel Fragment -- 1 Introduction -- 2 Preliminaries -- 3 Calculus -- 4 Soundness -- 5 Termination and Completeness -- 6 Related Work -- 7 Conclusion -- First-Order Logic Theorem Proving and Model Building via Approximation and Instantiation -- 1 Introduction -- 2 Linear Shallow Monadic Horn Approximation -- 3 Lifting a Conflicting Core -- 4 Approximation Refinement -- 5 Summary -- An Expressive Model for Instance Decomposition Based Parallel SAT Solvers -- 1 Introduction -- 2 Background -- 2.1 The Satisfiability Problem.
2.2 Partition Functions in SAT Solvers -- 2.3 Label Functions -- 3 The Instance Decomposition Model ID -- 4 Proof Format -- 5 Conclusion -- Decision Procedures -- Weakly Equivalent Arrays -- 1 Introduction -- 2 Notation -- 3 A Motivating Example -- 4 Weak Equivalences over Arrays -- 5 A Decision Procedure Based on Weak Equivalences -- 6 Extension to TAxDiff -- 7 Implementation and Evaluation -- 8 Conclusion and Future Work -- A Decision Procedure for Regular Membership and Length Constraints over Unbounded Strings -- 1 Introduction -- 1.1 Related Work -- 1.2 Formal Preliminaries -- 2 A Theory of Strings and Regular Language Membership -- 3 A Calculus for Constraint Satisfiability in TLR -- 4 Calculus Correctness -- 4.1 Termination -- 4.2 Correctness -- 4.3 Decidability -- 5 Conclusion and Further Work -- Adapting Real Quantifier Elimination Methods for Conflict Set Computation -- 1 Introduction -- 2 Real Quantifier Elimination -- 2.1 Cylindrical Algebraic Decomposition -- 2.2 Virtual Substitution -- 3 Finding Conflict Sets -- 3.1 Conflict Sets and Linear Programming -- 3.2 Conflict Sets and Quantifier Elimination Optimization -- 4 Finding Conflict Sets via Redlog -- 5 Conclusion -- Decision Procedures for Verification -- A New Acceleration-Based Combination Framework for Array Properties -- 1 Introduction -- 2 Notation -- 3 Acceleratable Fragments -- 4 Acceleration Modules in Satisfiability Procedures -- 5 Applications to Imperative Programs -- 6 Conclusions and Future Work -- Decidability of Verification of Safety Properties of Spatial Families of Linear Hybrid Automata -- 1 Introduction -- 2 Spatial Families of Hybrid Automata -- 3 Verification Tasks -- 3.1 Safety Properties -- 3.2 Reduction to Satisfiability Checking -- 4 Automated Reasoning -- 5 Verification: Decidability and Complexity -- 6 Tool Support -- 7 Conclusions.
Rewriting and Constraint Solving -- A Completion Method to Decide Reachabilityin Rewrite Systems -- 1 Introduction -- 2 Polarized Rewrite Systems -- 3 Cut-Elimination -- 4 Ground Finite Rewrite Systems -- 5 Pushdown Systems -- Axiomatic Constraint Systemsfor Proof Search Modulo Theories -- 1 Introduction -- 2 Ground Calculus and Examples -- 3 Constraint Structures -- 4 A System for Proof Search with Constraints -- 4.1 The Constraint-Producing Sequent Calculus LK?1 -- 4.2 Instantiations and Compatibility with Constraints -- 4.3 Soundness and Completeness -- 5 Sequentialising -- 5.1 Definition of the Proof System -- 5.2 Soundness and Completeness -- 6 Relating LK?"526930B 1 to LK1 -- 7 Implementation -- 8 Related Works and Further Work -- Transformations between SymbolicSystems -- Formalizing Soundness and Completeness of Unravelings -- 1 Introduction -- 2 Preliminaries -- 3 Formalizing Conditional Rewriting -- 4 Unravelings -- 5 Completeness of Unravelings -- 6 Soundness of Unravelings -- 7 Applying Unravelings to Confluence -- 8 Conclusion -- Proofs and Reconstructions -- 1 Introduction -- 2 Reconstruction Workflow -- 3 Cut Machines -- 3.1 Validating the Model -- 3.2 Using the Model -- 3.3 Extending the Model -- 4 Framework -- 4.1 Proof Generation -- 4.2 Formula Interpretation -- 4.3 Proof Analysis and Transformation -- 4.4 Emulation of Inference Rules -- 4.5 Generating a Cut Program -- 4.6 Executing a Cut Program -- 5 Implementation -- 5.1 Evaluation -- 6 Related Work -- 7 Conclusions -- Combination Methods -- A Rewriting Approach to the Combination of Data Structures with Bridging Theories -- 1 Introduction -- 2 Preliminaries: Notations and Combinations -- 3 Combination with Bridging Theories -- 4 Basic Data Structure Theories -- 5 Completeness Proof -- 6 Conclusion -- Unification and Matching in Hierarchical Combinations of Syntactic Theories.
1 Introduction -- 2 Preliminaries -- 3 Hierarchical Combination -- 3.1 Combination Procedure for Hierarchical Combination -- 4 Unification in Shallow Hierarchical Combination -- 5 Matching in Finite Syntactic Hierarchical Combination -- 5.1 Mutation-Based Procedure -- 5.2 Combination Procedure -- 5.3 Example: Matching in a Theory of Distributive Exponentiation -- 6 Conclusion -- Combining Forward and Backward Propagation -- 1 Introduction -- 2 Constraint Handling Rules -- 2.1 Syntax -- 2.2 Operational Forward Semantics -- 2.3 Operational Backwards Semantics -- 3 Combined CHR Programs -- 3.1 General Formulation -- 3.2 Forward CHR -- 3.3 Backward CHR -- 4 Interleaved Forward/Backward Propagation -- 5 Application for Combined Programs -- 5.1 Modeling -- 5.2 Strictly Forward -- 5.3 Strictly Backward -- 6 Conclusion -- Reasoning in Large Theories -- Random Forests for Premise Selection -- 1 Introduction -- 2 Premise Selection -- 2.1 Quality Measures -- 2.2 Evaluation -- 2.3 Used Datasets -- 3 Existing Algorithms -- 4 Adaptations to Random Forests for Premise Selection -- 4.1 Sample Selection -- 4.2 Incremental Update -- 4.3 Tree Size -- 4.4 Feature Selection -- 4.5 Querying a Tree -- 4.6 Querying a Forest -- 5 Experiments -- 6 Conclusion -- Lemmatization for Stronger Reasoning in Large Theories -- 1 Introduction -- 2 Lemmatization Scenario and Initial Statistics -- 3 Extracting Reusable Lemmas from Refutational Proofs -- 3.1 Extracting Lemmas from the Natural Deduction Proofs -- 4 Filtering Lemmas -- 4.1 Additional Filters -- 5 Problem-Specific Premise Selection -- 6 Evaluation -- 7 Examples of New Lemmas -- 8 Related Work -- 9 Conclusion and Future Work -- Author Index.
Record Nr. UNINA-9910483731403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Frontiers of Combining Systems [[electronic resource] ] : 10th International Symposium, FroCoS 2015, Wroclaw, Poland, September 21-24, 2015, Proceedings / / edited by Carsten Lutz, Silvio Ranise
Frontiers of Combining Systems [[electronic resource] ] : 10th International Symposium, FroCoS 2015, Wroclaw, Poland, September 21-24, 2015, Proceedings / / edited by Carsten Lutz, Silvio Ranise
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 357 p. 54 illus. in color.)
Disciplina 511.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Mathematical logic
Computer logic
Computer programming
Artificial Intelligence
Mathematical Logic and Formal Languages
Logics and Meanings of Programs
Programming Techniques
ISBN 3-319-24246-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Contents -- Invited Talk -- Free Variables and Theories: Revisiting Rigid E-Unification -- 1 Introduction -- 2 Background -- 2.1 Rigid E-Unification -- 2.2 Subterm Instantiation and Bounded Rigid E-Unification -- 2.3 Bounded Rigid E-Unification Formally -- 3 Semantically Solving BREU -- 3.1 Semantic Solvability in a First-Order Calculus -- 3.2 The Complexity of Semantic Solvability -- 4 Towards Bounded Rigid Theory Unification -- 5 Challenges and Conclusion -- Description Logics -- Decidable Description Logics of Context with Rigid Roles -- 1 Introduction -- 2 Basic Notions -- 3 Complexity of the Consistency Problem -- 4 The Case of EL: LM[[EL]] and EL[[LO]] -- 5 Conclusions -- Adding Threshold Concepts to the Description Logic EL -- 1 Introduction -- 2 The Description Logic EL -- 3 The Logic EL(m) -- 4 The Membership Function deg -- 5 Reasoning in EL(deg) -- 6 Concept Similarity and Relaxed Instance Queries -- 7 Conclusion -- Reasoning in Expressive Description Logicsunder Infinitely Valued Gödel Semantics -- 1 Introduction -- 2 Preliminaries -- 3 Automata for Complex Role Inclusions -- 4 The Reduction -- 5 Conclusions -- References -- Theorem Proving and Model Building -- NRCL - A Model Building Approach to the Bernays-Schönfinkel Fragment -- 1 Introduction -- 2 Preliminaries -- 3 Calculus -- 4 Soundness -- 5 Termination and Completeness -- 6 Related Work -- 7 Conclusion -- First-Order Logic Theorem Proving and Model Building via Approximation and Instantiation -- 1 Introduction -- 2 Linear Shallow Monadic Horn Approximation -- 3 Lifting a Conflicting Core -- 4 Approximation Refinement -- 5 Summary -- An Expressive Model for Instance Decomposition Based Parallel SAT Solvers -- 1 Introduction -- 2 Background -- 2.1 The Satisfiability Problem.
2.2 Partition Functions in SAT Solvers -- 2.3 Label Functions -- 3 The Instance Decomposition Model ID -- 4 Proof Format -- 5 Conclusion -- Decision Procedures -- Weakly Equivalent Arrays -- 1 Introduction -- 2 Notation -- 3 A Motivating Example -- 4 Weak Equivalences over Arrays -- 5 A Decision Procedure Based on Weak Equivalences -- 6 Extension to TAxDiff -- 7 Implementation and Evaluation -- 8 Conclusion and Future Work -- A Decision Procedure for Regular Membership and Length Constraints over Unbounded Strings -- 1 Introduction -- 1.1 Related Work -- 1.2 Formal Preliminaries -- 2 A Theory of Strings and Regular Language Membership -- 3 A Calculus for Constraint Satisfiability in TLR -- 4 Calculus Correctness -- 4.1 Termination -- 4.2 Correctness -- 4.3 Decidability -- 5 Conclusion and Further Work -- Adapting Real Quantifier Elimination Methods for Conflict Set Computation -- 1 Introduction -- 2 Real Quantifier Elimination -- 2.1 Cylindrical Algebraic Decomposition -- 2.2 Virtual Substitution -- 3 Finding Conflict Sets -- 3.1 Conflict Sets and Linear Programming -- 3.2 Conflict Sets and Quantifier Elimination Optimization -- 4 Finding Conflict Sets via Redlog -- 5 Conclusion -- Decision Procedures for Verification -- A New Acceleration-Based Combination Framework for Array Properties -- 1 Introduction -- 2 Notation -- 3 Acceleratable Fragments -- 4 Acceleration Modules in Satisfiability Procedures -- 5 Applications to Imperative Programs -- 6 Conclusions and Future Work -- Decidability of Verification of Safety Properties of Spatial Families of Linear Hybrid Automata -- 1 Introduction -- 2 Spatial Families of Hybrid Automata -- 3 Verification Tasks -- 3.1 Safety Properties -- 3.2 Reduction to Satisfiability Checking -- 4 Automated Reasoning -- 5 Verification: Decidability and Complexity -- 6 Tool Support -- 7 Conclusions.
Rewriting and Constraint Solving -- A Completion Method to Decide Reachabilityin Rewrite Systems -- 1 Introduction -- 2 Polarized Rewrite Systems -- 3 Cut-Elimination -- 4 Ground Finite Rewrite Systems -- 5 Pushdown Systems -- Axiomatic Constraint Systemsfor Proof Search Modulo Theories -- 1 Introduction -- 2 Ground Calculus and Examples -- 3 Constraint Structures -- 4 A System for Proof Search with Constraints -- 4.1 The Constraint-Producing Sequent Calculus LK?1 -- 4.2 Instantiations and Compatibility with Constraints -- 4.3 Soundness and Completeness -- 5 Sequentialising -- 5.1 Definition of the Proof System -- 5.2 Soundness and Completeness -- 6 Relating LK?"526930B 1 to LK1 -- 7 Implementation -- 8 Related Works and Further Work -- Transformations between SymbolicSystems -- Formalizing Soundness and Completeness of Unravelings -- 1 Introduction -- 2 Preliminaries -- 3 Formalizing Conditional Rewriting -- 4 Unravelings -- 5 Completeness of Unravelings -- 6 Soundness of Unravelings -- 7 Applying Unravelings to Confluence -- 8 Conclusion -- Proofs and Reconstructions -- 1 Introduction -- 2 Reconstruction Workflow -- 3 Cut Machines -- 3.1 Validating the Model -- 3.2 Using the Model -- 3.3 Extending the Model -- 4 Framework -- 4.1 Proof Generation -- 4.2 Formula Interpretation -- 4.3 Proof Analysis and Transformation -- 4.4 Emulation of Inference Rules -- 4.5 Generating a Cut Program -- 4.6 Executing a Cut Program -- 5 Implementation -- 5.1 Evaluation -- 6 Related Work -- 7 Conclusions -- Combination Methods -- A Rewriting Approach to the Combination of Data Structures with Bridging Theories -- 1 Introduction -- 2 Preliminaries: Notations and Combinations -- 3 Combination with Bridging Theories -- 4 Basic Data Structure Theories -- 5 Completeness Proof -- 6 Conclusion -- Unification and Matching in Hierarchical Combinations of Syntactic Theories.
1 Introduction -- 2 Preliminaries -- 3 Hierarchical Combination -- 3.1 Combination Procedure for Hierarchical Combination -- 4 Unification in Shallow Hierarchical Combination -- 5 Matching in Finite Syntactic Hierarchical Combination -- 5.1 Mutation-Based Procedure -- 5.2 Combination Procedure -- 5.3 Example: Matching in a Theory of Distributive Exponentiation -- 6 Conclusion -- Combining Forward and Backward Propagation -- 1 Introduction -- 2 Constraint Handling Rules -- 2.1 Syntax -- 2.2 Operational Forward Semantics -- 2.3 Operational Backwards Semantics -- 3 Combined CHR Programs -- 3.1 General Formulation -- 3.2 Forward CHR -- 3.3 Backward CHR -- 4 Interleaved Forward/Backward Propagation -- 5 Application for Combined Programs -- 5.1 Modeling -- 5.2 Strictly Forward -- 5.3 Strictly Backward -- 6 Conclusion -- Reasoning in Large Theories -- Random Forests for Premise Selection -- 1 Introduction -- 2 Premise Selection -- 2.1 Quality Measures -- 2.2 Evaluation -- 2.3 Used Datasets -- 3 Existing Algorithms -- 4 Adaptations to Random Forests for Premise Selection -- 4.1 Sample Selection -- 4.2 Incremental Update -- 4.3 Tree Size -- 4.4 Feature Selection -- 4.5 Querying a Tree -- 4.6 Querying a Forest -- 5 Experiments -- 6 Conclusion -- Lemmatization for Stronger Reasoning in Large Theories -- 1 Introduction -- 2 Lemmatization Scenario and Initial Statistics -- 3 Extracting Reusable Lemmas from Refutational Proofs -- 3.1 Extracting Lemmas from the Natural Deduction Proofs -- 4 Filtering Lemmas -- 4.1 Additional Filters -- 5 Problem-Specific Premise Selection -- 6 Evaluation -- 7 Examples of New Lemmas -- 8 Related Work -- 9 Conclusion and Future Work -- Author Index.
Record Nr. UNISA-996466470503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings / / edited by Rafael Accorsi, Silvio Ranise
Security and Trust Management [[electronic resource] ] : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings / / edited by Rafael Accorsi, Silvio Ranise
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 235 p. 53 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Software engineering
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Software Engineering
ISBN 3-642-41098-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy -- On Enhancement of ‘Share The Secret’ Scheme for Location Privacy -- New Attacks against Transformation-Based Privacy-Preserving Linear Programming -- Maintaining Database Anonymity in the Presence of Queries -- Network, Web, and Mobile Security -- A Probabilistic Framework for Distributed Localization of Attackers in MANETs -- MITHYS: Mind The Hand You Shake -- Evaluating the manageability of web browsers controls -- Security Protocols -- Using Interpolation for the Verification of Security Protocols -- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases -- Security Policies and Trust Management -- Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names -- Probabilistic Cost Enforcement of Security Policies -- Selective Disclosure in Datalog-based Trust Management -- Business Process Security -- Towards a Detective Approach to Business Process-centered Resilience -- IF-Net: A Meta-model for Security-oriented Process Specification -- Watermarking for Security -- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation -- Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain.
Record Nr. UNISA-996465546603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings / / edited by Rafael Accorsi, Silvio Ranise
Security and Trust Management [[electronic resource] ] : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013, Proceedings / / edited by Rafael Accorsi, Silvio Ranise
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 235 p. 53 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Software engineering
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Software Engineering
ISBN 3-642-41098-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy -- On Enhancement of ‘Share The Secret’ Scheme for Location Privacy -- New Attacks against Transformation-Based Privacy-Preserving Linear Programming -- Maintaining Database Anonymity in the Presence of Queries -- Network, Web, and Mobile Security -- A Probabilistic Framework for Distributed Localization of Attackers in MANETs -- MITHYS: Mind The Hand You Shake -- Evaluating the manageability of web browsers controls -- Security Protocols -- Using Interpolation for the Verification of Security Protocols -- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases -- Security Policies and Trust Management -- Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names -- Probabilistic Cost Enforcement of Security Policies -- Selective Disclosure in Datalog-based Trust Management -- Business Process Security -- Towards a Detective Approach to Business Process-centered Resilience -- IF-Net: A Meta-model for Security-oriented Process Specification -- Watermarking for Security -- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation -- Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain.
Record Nr. UNINA-9910483494503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui