Attacks and defenses for the internet-of-things : 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / / edited by WenJuan Li, Steven Furnell, Weizhi Meng |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (187 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes in Computer Science Ser. |
Soggetto topico | Computers |
ISBN | 3-031-21311-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- 1 Introduction -- 2 Framework -- 2.1 Tested Metrics -- 2.2 Test Platforms -- 3 Evaluated Ciphers -- 4 Results -- 5 Conclusion -- References -- Evolving a Boolean Masked Adder Using Neuroevolution -- 1 Introduction -- 1.1 Contributions -- 1.2 Paper Organization -- 2 Efficient Side-Channel Protection -- 2.1 Conventional Masking of Addition -- 2.2 Optimizing Masked Addition Using Neuroevolution -- 3 Results -- 4 Application to Software Encryption -- 4.1 Shared Bitsliced Adder Assembly Implementation -- 4.2 Benchmark Results -- 5 Leakage Evaluation -- 6 Conclusion -- A ARM Assembly Implementation of the Shared Bitsliced 32-bit Adder -- References -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) -- 1 Introduction -- 2 Background and Related Work -- 2.1 Explainable AI (XAI) -- 2.2 Unsupervised Model Explanations -- 2.3 Explaining Anomalies -- 3 Methodology -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Experimental Setting -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Aggregate Signatures -- 2.3 Aggregate Signatures with Interactive Tracing Functionality -- 3 Feedback Waiting Time in ASIT -- 3.1 Existing Instantiations of DTT and ASIT -- 3.2 Evaluation of the Feedback Waiting Time of AS-FT-2 -- 4 An ASIT Scheme Without Feedback -- 4.1 Sequential Traitor Tracing -- 4.2 The Construction of an ASIT Scheme Without a Feedback -- 5 Comparison of AS-SW-1 with AS-FT-2 -- 5.1 Theoretical Evaluations -- 5.2 Implementation Evaluations -- 6 Conclusion -- References.
Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions (Extended Abstract) -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Kyber Authenticated Key Exchange -- 3.2 Security Increase with SRAM BPUFs -- 4 Proposed Authentication Protocol -- 4.1 Assumptions -- 4.2 Enrollment Phase -- 4.3 Authentication Phase -- 5 Discussion and Experimental Results -- 6 Conclusions -- References -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study -- 1 Introduction -- 2 Survey of Change Point Detection Algorithms -- 2.1 Problem Statement -- 2.2 Cost Functions -- 2.3 Search Methods -- 2.4 Evaluation -- 3 Experimental Results and Discussions -- 3.1 Enviroment Setup -- 3.2 Results and Discussions -- 4 Conclusions and Future Work -- References -- Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots -- 1 Introduction -- 2 Definitions and Research Models -- 2.1 Definitions -- 2.2 Research Devices -- 2.3 Network Topology -- 2.4 Threat Model -- 3 Methodologies -- 3.1 Traffic Redirection -- 3.2 Traffic Analysis -- 3.3 App Analysis -- 4 Privacy Protection Methods: Procedural Description -- 4.1 Isolation Methods -- 4.2 Restriction Methods -- 4.3 Home Security Device -- 5 Privacy Protection Methods: Evaluation -- 5.1 Evaluation Framework -- 5.2 Isolation Methods -- 5.3 Restriction Methods -- 5.4 Home Security Device -- 6 Conclusion -- 6.1 Comparison Table -- 6.2 Limitations -- 6.3 Current State of Privacy Protection -- References -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Baseline Federated Deep Learning (BFDL) -- 3.2 Resource Efficient Federated Deep Learning (REFDL) -- 4 Evaluation -- 4.1 Utilized Datasets. 4.2 Virtual Workers Experimental Setup and Implementation -- 4.3 Testbed Experimental Setup and Implementation -- 5 Results and Discussion -- 5.1 Virtual Workers Simulation Results -- 5.2 Network Workers Testbed Results -- 6 Conclusion -- References -- Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- 1 Introduction -- 1.1 Goals and Contributions -- 1.2 Outline -- 2 Related Work -- 2.1 General Vehicular Security Concepts Describe the Threat of Unwanted Information Flow -- 2.2 Filtering of Inbound Traffic Towards the Car's ECUs Exists -- 2.3 Commercial Available Approaches Towards Filtering and Securing the OBD-II Interface -- 3 Threat Modelling for OBD-II -- 3.1 Threats Following STRIDE -- 3.2 Results of OBD-II Threat Modeling -- 4 Architecture of the Man-in-the-OBD -- 4.1 Producer/Consumer Scheme -- 4.2 Modular Approach for Protocol Bindings -- 4.3 CAN-Bus Binding -- 4.4 Processing Pipeline -- 4.5 Serialization -- 4.6 Data Storage -- 4.7 Policy Management -- 4.8 Rule Enforcement -- 5 Implementation -- 5.1 Producer/Consumer Solution -- 5.2 Storing of CAN-Messages -- 5.3 Pipeline Benchmarks -- 6 Evaluation of Impact on Threats and Existing Dongles -- 6.1 Testing the RYD-Box -- 6.2 Testing the VW Data Plug -- 6.3 Evaluation of Existing Dongles -- 6.4 Evaluation of Threat Mitigation -- 7 Conclusion -- 7.1 Future Work -- References -- Mapping the Security Events to the MITRE ATT& -- CK Attack Patterns to Forecast Attack Propagation (Extended Abstract) -- 1 Introduction -- 2 Related Research -- 3 Technique for Mapping the Security Events to the Attack Patterns -- 4 Implementation and Experiments -- 5 Discussion and Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996503470703316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Attacks and Defenses for the Internet-of-Things : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers / / edited by Wenjuan Li, Steven Furnell, Weizhi Meng |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (187 pages) |
Disciplina |
929.605
004.678 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Internet of things
Computer networks Computers Cryptography Data encryption (Computer science) Computer networks - Security measures Software engineering Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering |
ISBN | 3-031-21311-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. . |
Record Nr. | UNINA-9910634042903321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computer communication systems Computer organization Software engineering Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Computer Systems Organization and Communication Networks Software Engineering |
ISBN | 3-030-42048-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). |
Record Nr. | UNISA-996418206503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computer communication systems Computer organization Software engineering Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computer Communication Networks Computer Systems Organization and Communication Networks Software Engineering |
ISBN | 3-030-42048-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). |
Record Nr. | UNINA-9910380747703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai |
Autore | Katsikas Sokratis |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (785 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
AbieHabtamu
RaniseSilvio VerderameLuca CambiasoEnrico UgarelliRita PraçaIsabel LiWenjuan MengWeizhi FurnellSteven |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks - Security measures
Cryptography Data encryption (Computer science) Computers Computer engineering Computer networks Data protection Mobile and Network Security Cryptology Computing Milieux Computer Engineering and Networks Data and Information Security Computer Communication Networks |
ISBN | 3-031-54129-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification. 4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives. 5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee. Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study. 3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger. |
Record Nr. | UNISA-996589546603316 |
Katsikas Sokratis | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai |
Autore | Katsikas Sokratis |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (785 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
AbieHabtamu
RaniseSilvio VerderameLuca CambiasoEnrico UgarelliRita PraçaIsabel LiWenjuan MengWeizhi FurnellSteven |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks - Security measures
Cryptography Data encryption (Computer science) Computers Computer engineering Computer networks Data protection Mobile and Network Security Cryptology Computing Milieux Computer Engineering and Networks Data and Information Security Computer Communication Networks |
ISBN | 3-031-54129-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification. 4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives. 5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee. Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study. 3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger. |
Record Nr. | UNINA-9910842491003321 |
Katsikas Sokratis | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Human Aspects of Information Security and Assurance [[electronic resource] ] : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / / edited by Nathan Clarke, Steven Furnell |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XI, 367 p. 51 illus., 30 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Application software
Computer security Data encryption (Computer science) Computer networks - Security measures Computer communication systems Information Systems Applications (incl. Internet) Systems and Data Security Cryptology Mobile and Network Security Computer Communication Networks |
ISBN | 3-030-57404-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees’ Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users’ Software Robustness -- Security Policy -- SMEs’ Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- “Most Companies Share Whatever They Can to Make Money!”: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions. |
Record Nr. | UNISA-996465450903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / / edited by Nathan Clarke, Steven Furnell |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XI, 367 p. 51 illus., 30 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Application software
Data protection Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer and Information Systems Applications Data and Information Security Cryptology Mobile and Network Security Computer Communication Networks |
ISBN | 3-030-57404-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees’ Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users’ Software Robustness -- Security Policy -- SMEs’ Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- “Most Companies Share Whatever They Can to Make Money!”: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions. |
Record Nr. | UNINA-9910427691203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT Systems Security and Privacy Protection : 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings / / edited by Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis |
Autore | Pitropakis Nikolaos |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (509 pages) |
Disciplina | 004 |
Altri autori (Persone) |
KatsikasSokratis
FurnellSteven MarkantonakisKonstantinos |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computers
Computer networks Cryptography Data encryption (Computer science) Computing Milieux Computer Communication Networks Cryptology |
ISBN | 3-031-65175-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- ”Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference. |
Record Nr. | UNINA-9910878069103321 |
Pitropakis Nikolaos | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems Security and Privacy [[electronic resource] ] : 7th International Conference, ICISSP 2021, Virtual Event, February 11–13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9–11, 2022, Revised Selected Papers / / edited by Paolo Mori, Gabriele Lenzini, Steven Furnell |
Autore | Mori Paolo |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (137 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
LenziniGabriele
FurnellSteven |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering Computer engineering Computer networks Data and Information Security Cryptology Mobile and Network Security Security Services Software Engineering Computer Engineering and Networks |
ISBN | 3-031-37807-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet -- Zero Update Encryption Adjustment on Encrypted Database Queries -- Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy -- Improving Data Security and Privacy for Ontology based Data Access -- Experimentally Obtained Differential-linear Distinguishers for Permutations of ASCON and DryGASCON -- A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware. |
Record Nr. | UNISA-996546823703316 |
Mori Paolo | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|