Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
| Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter |
| Autore | Dalla Preda Mila |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (611 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
SchrittwieserSebastian
NaessensVincent De SutterBjorn |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Data and Information Security |
| ISBN | 3-032-00627-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter – Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks. |
| Record Nr. | UNINA-9911020414203321 |
Dalla Preda Mila
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
| Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter |
| Autore | Dalla Preda Mila |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (649 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
SchrittwieserSebastian
NaessensVincent De SutterBjorn |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Data and Information Security |
| ISBN | 3-032-00624-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models. |
| Record Nr. | UNINA-9911020426703321 |
Dalla Preda Mila
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
| Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter |
| Autore | Dalla Preda Mila |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (611 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
SchrittwieserSebastian
NaessensVincent De SutterBjorn |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Data and Information Security |
| ISBN | 3-032-00627-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter – Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks. |
| Record Nr. | UNISA-996673180703316 |
Dalla Preda Mila
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
| Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter |
| Autore | Dalla Preda Mila |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (649 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
SchrittwieserSebastian
NaessensVincent De SutterBjorn |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Data and Information Security |
| ISBN | 3-032-00624-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models. |
| Record Nr. | UNISA-996673177403316 |
Dalla Preda Mila
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||