top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (489 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00630-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025): Profiling Electric Vehicles via Early Charging Voltage Patterns -- ARCeR: an Agentic RAG for the Automated Definition of Cyber Ranges -- Edge Virtual Fence for Smart Airport Physical Security: A Case Study -- Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics -- A Multi-Dataset Evaluation of Models for Automated Vulnerability Repair -- Adversarial Robustness of Machine Learning-based Access Control -- Towards Robust Artificial Intelligence: Self-Supervised Learning Approach for Out-of-Distribution Detection. Eighth International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2025): Performance Evaluation of Quantum-Resistant Algorithms on Industrial Embedded Systems -- TADFICS: A Threat-Aware Digital Forensics Data Model for ICS -- A Robust Hybrid Framework Combining Deductive Temporal Logic and Machine Learning for Fault and Cyber-Attack Detection in the Tennessee Eastman Process -- KIDS: Intrusion Detection for Industrial Control Systems. First Workshop on Sustainable Security and Awareness For nExt Generation infRastructures (SAFER 2025): Effects of the Cyber Resilience Act (CRA) on Industrial Equipment Manufacturing Companies -- Dynamic Access Policies for Energy Cost Management of Microservices -- Are Trees Really Green? A Detection Approach of IoT Malware Attacks -- Towards A Capability Model of Kubernetes Runtime Security Enforcement Mechanisms. Fourth Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025): A Method for Explainable Anomaly detection in Substation Networks through Deep Learning -- Safety and Cybersecurity under Emerging EU Legislations for Industry: A Use-case Driven Perspective -- An Explainable Method for Malware Detection through Convolutional Neural Networks -- Securing the Additive Manufacturing Process Chain.
Record Nr. UNINA-9911020418103321
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part III / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part III / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (544 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00635-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11’s Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika ”AI Companion” Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won’t you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter.
Record Nr. UNINA-9911020427003321
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part IV / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part IV / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (503 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00639-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025): Securing the Road Ahead: Supporting Decision Making in Automotive Cybersecurity Risk Treatment -- A Data-Driven Approach for Cyber Security Assessments of SMEs -- A Viewpoint-based Model of Data Protection Impact Assessments -- Cybersecurity Vulnerability Prioritisation via Risk Assessment. Second International Workshop on Emerging Digital Identities (EDId 2025): Attestation of Electronic Identification Schemes based on Secure Channels through Security Microcontrollers -- A High-Level-of-Assurance EUDI Wallet with a Remote WSCD Supporting Biometrics and Passkeys -- Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers -- Identity and Access Management for Dataspaces using the European Business Wallet and eIDAS-based Credentials -- Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2 -- Authentication Inconsistencies Across Online Services: A Multi-Scenario Security Analysis. Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025): A Review of Deep Packet Inspection for Network Security: From Traditional Techniques to Machine Learning Integration -- Building Realistic Ground Truth Datasets of Personal Identification Information for Entity Matching -- A Quantum-Safe Hybrid Cryptographic Framework for Multimedia Application. 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025): Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles -- Leveraging Graph Neural Networks for Attack Detection in IoT Systems -- Hyperparameter Optimization in Neuro-Symbolic Unsupervised Graph Learning. 5th International Workshop on Behavioral Authentication for System Security (BASS 2025): Behavior-Based Anomaly Detection in Access and Usage Control for Smart Home Environments -- Unmasking Model Behavior: How LLMs reason on Vulnerability Detection -- Leveraging Knowledge Graphs and LLMs for Structured Generation of Misinformation.
Record Nr. UNINA-9911020428303321
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (520 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00633-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025): SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis -- Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey -- Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment -- Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies -- Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs -- Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems -- Quantum Security Mechanisms for Defense Applications -- Risk-Aware Adaptive Cyber Deception Guided by Large Language Models -- Reducing Information Overload: Because Even Security Experts Need to Blink. First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025): Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications -- Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information -- SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework -- Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats -- 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025): Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA -- Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches -- A Time Series Analysis of Malware Uploads to Programming Language Ecosystems -- A Role Taxonomy in Security-Safety Incident Response -- Promoting Privacy Compliant Data Management in Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model -- Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control -- An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites -- Large-scale security analysis of hardware wallets.
Record Nr. UNINA-9911020419003321
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (489 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00630-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025): Profiling Electric Vehicles via Early Charging Voltage Patterns -- ARCeR: an Agentic RAG for the Automated Definition of Cyber Ranges -- Edge Virtual Fence for Smart Airport Physical Security: A Case Study -- Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics -- A Multi-Dataset Evaluation of Models for Automated Vulnerability Repair -- Adversarial Robustness of Machine Learning-based Access Control -- Towards Robust Artificial Intelligence: Self-Supervised Learning Approach for Out-of-Distribution Detection. Eighth International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2025): Performance Evaluation of Quantum-Resistant Algorithms on Industrial Embedded Systems -- TADFICS: A Threat-Aware Digital Forensics Data Model for ICS -- A Robust Hybrid Framework Combining Deductive Temporal Logic and Machine Learning for Fault and Cyber-Attack Detection in the Tennessee Eastman Process -- KIDS: Intrusion Detection for Industrial Control Systems. First Workshop on Sustainable Security and Awareness For nExt Generation infRastructures (SAFER 2025): Effects of the Cyber Resilience Act (CRA) on Industrial Equipment Manufacturing Companies -- Dynamic Access Policies for Energy Cost Management of Microservices -- Are Trees Really Green? A Detection Approach of IoT Malware Attacks -- Towards A Capability Model of Kubernetes Runtime Security Enforcement Mechanisms. Fourth Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025): A Method for Explainable Anomaly detection in Substation Networks through Deep Learning -- Safety and Cybersecurity under Emerging EU Legislations for Industry: A Use-case Driven Perspective -- An Explainable Method for Malware Detection through Convolutional Neural Networks -- Securing the Additive Manufacturing Process Chain.
Record Nr. UNISA-996673178403316
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part III / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part III / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (544 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00635-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 18th International Workshop on Digital Forensics (WSDF 2025): Forensic Insights into Windows 11’s Capability Access Manager Artifacts -- Reconstructing File Versions and Timestamps: Challenges and Guidelines in Network Forensics -- Measuring the effectiveness of keyword lists in digital forensics -- Money on My Mind: Forensic Investigation of Venmo Payment App -- Forensic Analysis of AI Systems - A Replika ”AI Companion” Example -- An AI-Based Network Forensic Readiness Framework for Resource-Constrained Environments -- Mapping the Research Landscape - An Exploratory Analysis of AI Applications in Digital Forensics -- The impact of anti-forensic techniques on data-driven digital forensics: anomaly detection case study. 14th International Workshop on Cyber Crime (IWCC 2025): Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA -- Towards Creating a Darknet Image Database -- Hello, won’t you tell me your name?: Investigating Anonymity Abuse in IPFS -- Countering Financial Cyber Crime: New Method for Subsequent Steps Analysis in Large Complex Graphs of Financial Transactions -- From Sign-Up to Multi-Million Revenues: A Deep Dive into Vendors on Darknet Marketplaces. 9th International Workshop on Cyber Use of Information Hiding (CUING 2025): Contextual Coherence Evaluation of Perfectly Secure Steganography in Text Documents -- Robust Hashing meets Inpainting -- Describing Steganography Hiding Methods by Combining Pre-Existing Methodology -- Calyptography: Secure Secret Storage Inspired by Cryptography and Steganography -- An Independent Secure Authentication System against False Positive/Negative attacks in SVD Based Watermarking: Design and Implementation -- Entropy-Aware Secret Data Embedding for Network Storage Channels -- ReWaP: Reversible Watermarking and Paillier Encryption Approach for Privacy-Preserving Smart Meter.
Record Nr. UNISA-996673176103316
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (520 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00633-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025): SC4OSINT: A Story Clustering Approach to Optimize OSINT Analysis -- Benign User Activities that Trigger False Positives in Intrusion Detection Systems: An Expert Survey -- Enhancing Cyber Situational Awareness with AI: A Novel Pipeline Approach for Threat Intelligence Analysis and Enrichment -- Ontology-Based Model for Federated Systems Using JC3IEDM Taxonomies -- Large Language Models for Cyber Threat Intelligence: Extracting MITRE With LLMs -- Enhancing Cyber Situation Awareness: Visualizing Advanced Persistent Threats as Complex Systems -- Quantum Security Mechanisms for Defense Applications -- Risk-Aware Adaptive Cyber Deception Guided by Large Language Models -- Reducing Information Overload: Because Even Security Experts Need to Blink. First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025): Behavior-Based Detection of Instagram Addiction Using Machine Learning: Accuracy and Privacy Implications -- Mitigating Bias in Recruitment: A Practical Approach to CV De-identification Considering Privacy Sensitive Information -- SynthGuard: Redefining Synthetic Data Generation with a Scalable and Privacy-Preserving Workflow Framework -- Designing a Framework to Tackle the Multifaceted Intricacies of Insider Threats -- 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025): Evaluating Turnstile as a Privacy-Conscious Alternative to reCAPTCHA -- Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches -- A Time Series Analysis of Malware Uploads to Programming Language Ecosystems -- A Role Taxonomy in Security-Safety Incident Response -- Promoting Privacy Compliant Data Management in Digital Marketplaces: A Privacy-Aware Data Classification and Taxonomy Reference Model -- Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control -- An Empirical Measurement of Cookie Banners Potential Legal Violations in EU vs US Websites -- Large-scale security analysis of hardware wallets.
Record Nr. UNISA-996673175303316
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part IV / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part IV / / edited by Bart Coppens, Bruno Volckaert, Vincent Naessens, Bjorn De Sutter
Autore Coppens Bart
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (503 pages)
Disciplina 005.8
Altri autori (Persone) VolckaertBruno
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00639-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025): Securing the Road Ahead: Supporting Decision Making in Automotive Cybersecurity Risk Treatment -- A Data-Driven Approach for Cyber Security Assessments of SMEs -- A Viewpoint-based Model of Data Protection Impact Assessments -- Cybersecurity Vulnerability Prioritisation via Risk Assessment. Second International Workshop on Emerging Digital Identities (EDId 2025): Attestation of Electronic Identification Schemes based on Secure Channels through Security Microcontrollers -- A High-Level-of-Assurance EUDI Wallet with a Remote WSCD Supporting Biometrics and Passkeys -- Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers -- Identity and Access Management for Dataspaces using the European Business Wallet and eIDAS-based Credentials -- Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2 -- Authentication Inconsistencies Across Online Services: A Multi-Scenario Security Analysis. Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025): A Review of Deep Packet Inspection for Network Security: From Traditional Techniques to Machine Learning Integration -- Building Realistic Ground Truth Datasets of Personal Identification Information for Entity Matching -- A Quantum-Safe Hybrid Cryptographic Framework for Multimedia Application. 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025): Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles -- Leveraging Graph Neural Networks for Attack Detection in IoT Systems -- Hyperparameter Optimization in Neuro-Symbolic Unsupervised Graph Learning. 5th International Workshop on Behavioral Authentication for System Security (BASS 2025): Behavior-Based Anomaly Detection in Access and Usage Control for Smart Home Environments -- Unmasking Model Behavior: How LLMs reason on Vulnerability Detection -- Leveraging Knowledge Graphs and LLMs for Structured Generation of Misinformation.
Record Nr. UNISA-996673175703316
Coppens Bart  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
Autore Dalla Preda Mila
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (611 pages)
Disciplina 005.8
Altri autori (Persone) SchrittwieserSebastian
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00627-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter – Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks.
Record Nr. UNINA-9911020414203321
Dalla Preda Mila  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
Autore Dalla Preda Mila
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (649 pages)
Disciplina 005.8
Altri autori (Persone) SchrittwieserSebastian
NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00624-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles -- Prink: ks-Anonymization for Streaming Data in Apache Flink -- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring -- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic -- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences -- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets -- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels -- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles -- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting -- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection -- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors -- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks -- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks -- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model -- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning -- Gradient Inversion of Federated Diffusion Models -- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems -- BTDT: Membership Inference Attacks against Large Language Models.
Record Nr. UNINA-9911020426703321
Dalla Preda Mila  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui