top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (833 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07894-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.
Record Nr. UNINA-9911047682003321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (793 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07884-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models.
Record Nr. UNISA-996691666303316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (753 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07901-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.
Record Nr. UNINA-9911047656503321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (0 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07891-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements.
Record Nr. UNINA-9911046554303321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (0 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07891-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements.
Record Nr. UNISA-996691666003316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (753 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07901-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.
Record Nr. UNISA-996691665803316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (833 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07894-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.
Record Nr. UNISA-996691663503316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (793 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07884-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models.
Record Nr. UNINA-9911046532203321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Practice of Security [[electronic resource] ] : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Foundations and Practice of Security [[electronic resource] ] : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (415 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer communication systems
Artificial intelligence
Systems and Data Security
Information Systems and Communication Service
Computer Communication Networks
Artificial Intelligence
ISBN 3-030-45371-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
Record Nr. UNISA-996418214603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (415 pages) : illustrations
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Database management
Computer networks
Artificial intelligence
Data and Information Security
Database Management System
Computer Communication Networks
Artificial Intelligence
ISBN 3-030-45371-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance.
Record Nr. UNINA-9910409672503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui