top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Attacks and defenses for the internet-of-things : 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / / edited by WenJuan Li, Steven Furnell, Weizhi Meng
Attacks and defenses for the internet-of-things : 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / / edited by WenJuan Li, Steven Furnell, Weizhi Meng
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (187 pages)
Disciplina 929.605
Collana Lecture Notes in Computer Science Ser.
Soggetto topico Computers
ISBN 3-031-21311-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- 1 Introduction -- 2 Framework -- 2.1 Tested Metrics -- 2.2 Test Platforms -- 3 Evaluated Ciphers -- 4 Results -- 5 Conclusion -- References -- Evolving a Boolean Masked Adder Using Neuroevolution -- 1 Introduction -- 1.1 Contributions -- 1.2 Paper Organization -- 2 Efficient Side-Channel Protection -- 2.1 Conventional Masking of Addition -- 2.2 Optimizing Masked Addition Using Neuroevolution -- 3 Results -- 4 Application to Software Encryption -- 4.1 Shared Bitsliced Adder Assembly Implementation -- 4.2 Benchmark Results -- 5 Leakage Evaluation -- 6 Conclusion -- A ARM Assembly Implementation of the Shared Bitsliced 32-bit Adder -- References -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) -- 1 Introduction -- 2 Background and Related Work -- 2.1 Explainable AI (XAI) -- 2.2 Unsupervised Model Explanations -- 2.3 Explaining Anomalies -- 3 Methodology -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Experimental Setting -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Aggregate Signatures -- 2.3 Aggregate Signatures with Interactive Tracing Functionality -- 3 Feedback Waiting Time in ASIT -- 3.1 Existing Instantiations of DTT and ASIT -- 3.2 Evaluation of the Feedback Waiting Time of AS-FT-2 -- 4 An ASIT Scheme Without Feedback -- 4.1 Sequential Traitor Tracing -- 4.2 The Construction of an ASIT Scheme Without a Feedback -- 5 Comparison of AS-SW-1 with AS-FT-2 -- 5.1 Theoretical Evaluations -- 5.2 Implementation Evaluations -- 6 Conclusion -- References.
Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions (Extended Abstract) -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Kyber Authenticated Key Exchange -- 3.2 Security Increase with SRAM BPUFs -- 4 Proposed Authentication Protocol -- 4.1 Assumptions -- 4.2 Enrollment Phase -- 4.3 Authentication Phase -- 5 Discussion and Experimental Results -- 6 Conclusions -- References -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study -- 1 Introduction -- 2 Survey of Change Point Detection Algorithms -- 2.1 Problem Statement -- 2.2 Cost Functions -- 2.3 Search Methods -- 2.4 Evaluation -- 3 Experimental Results and Discussions -- 3.1 Enviroment Setup -- 3.2 Results and Discussions -- 4 Conclusions and Future Work -- References -- Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots -- 1 Introduction -- 2 Definitions and Research Models -- 2.1 Definitions -- 2.2 Research Devices -- 2.3 Network Topology -- 2.4 Threat Model -- 3 Methodologies -- 3.1 Traffic Redirection -- 3.2 Traffic Analysis -- 3.3 App Analysis -- 4 Privacy Protection Methods: Procedural Description -- 4.1 Isolation Methods -- 4.2 Restriction Methods -- 4.3 Home Security Device -- 5 Privacy Protection Methods: Evaluation -- 5.1 Evaluation Framework -- 5.2 Isolation Methods -- 5.3 Restriction Methods -- 5.4 Home Security Device -- 6 Conclusion -- 6.1 Comparison Table -- 6.2 Limitations -- 6.3 Current State of Privacy Protection -- References -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Baseline Federated Deep Learning (BFDL) -- 3.2 Resource Efficient Federated Deep Learning (REFDL) -- 4 Evaluation -- 4.1 Utilized Datasets.
4.2 Virtual Workers Experimental Setup and Implementation -- 4.3 Testbed Experimental Setup and Implementation -- 5 Results and Discussion -- 5.1 Virtual Workers Simulation Results -- 5.2 Network Workers Testbed Results -- 6 Conclusion -- References -- Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- 1 Introduction -- 1.1 Goals and Contributions -- 1.2 Outline -- 2 Related Work -- 2.1 General Vehicular Security Concepts Describe the Threat of Unwanted Information Flow -- 2.2 Filtering of Inbound Traffic Towards the Car's ECUs Exists -- 2.3 Commercial Available Approaches Towards Filtering and Securing the OBD-II Interface -- 3 Threat Modelling for OBD-II -- 3.1 Threats Following STRIDE -- 3.2 Results of OBD-II Threat Modeling -- 4 Architecture of the Man-in-the-OBD -- 4.1 Producer/Consumer Scheme -- 4.2 Modular Approach for Protocol Bindings -- 4.3 CAN-Bus Binding -- 4.4 Processing Pipeline -- 4.5 Serialization -- 4.6 Data Storage -- 4.7 Policy Management -- 4.8 Rule Enforcement -- 5 Implementation -- 5.1 Producer/Consumer Solution -- 5.2 Storing of CAN-Messages -- 5.3 Pipeline Benchmarks -- 6 Evaluation of Impact on Threats and Existing Dongles -- 6.1 Testing the RYD-Box -- 6.2 Testing the VW Data Plug -- 6.3 Evaluation of Existing Dongles -- 6.4 Evaluation of Threat Mitigation -- 7 Conclusion -- 7.1 Future Work -- References -- Mapping the Security Events to the MITRE ATT& -- CK Attack Patterns to Forecast Attack Propagation (Extended Abstract) -- 1 Introduction -- 2 Related Research -- 3 Technique for Mapping the Security Events to the Attack Patterns -- 4 Implementation and Experiments -- 5 Discussion and Conclusion -- References -- Author Index.
Record Nr. UNISA-996503470703316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Attacks and Defenses for the Internet-of-Things : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers / / edited by Wenjuan Li, Steven Furnell, Weizhi Meng
Attacks and Defenses for the Internet-of-Things : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers / / edited by Wenjuan Li, Steven Furnell, Weizhi Meng
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (187 pages)
Disciplina 929.605
004.678
Collana Lecture Notes in Computer Science
Soggetto topico Internet of things
Computer networks
Computers
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Software engineering
Internet of Things
Computer Communication Networks
Computing Milieux
Cryptology
Mobile and Network Security
Software Engineering
ISBN 3-031-21311-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. .
Record Nr. UNINA-9910634042903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Computer communication systems
Computer organization
Software engineering
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Computer Communication Networks
Computer Systems Organization and Communication Networks
Software Engineering
ISBN 3-030-42048-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019).
Record Nr. UNISA-996418206503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Computer communication systems
Computer organization
Software engineering
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Computer Communication Networks
Computer Systems Organization and Communication Networks
Software Engineering
ISBN 3-030-42048-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019).
Record Nr. UNINA-9910380747703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Autore Katsikas Sokratis
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (785 pages)
Disciplina 005.8
Altri autori (Persone) AbieHabtamu
RaniseSilvio
VerderameLuca
CambiasoEnrico
UgarelliRita
PraçaIsabel
LiWenjuan
MengWeizhi
FurnellSteven
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computers
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Cryptology
Computing Milieux
Computer Engineering and Networks
Data and Information Security
Computer Communication Networks
ISBN 3-031-54129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification.
4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives.
5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee.
Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study.
3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger.
Record Nr. UNISA-996589546603316
Katsikas Sokratis  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Autore Katsikas Sokratis
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (785 pages)
Disciplina 005.8
Altri autori (Persone) AbieHabtamu
RaniseSilvio
VerderameLuca
CambiasoEnrico
UgarelliRita
PraçaIsabel
LiWenjuan
MengWeizhi
FurnellSteven
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computers
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Cryptology
Computing Milieux
Computer Engineering and Networks
Data and Information Security
Computer Communication Networks
ISBN 3-031-54129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification.
4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives.
5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee.
Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study.
3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger.
Record Nr. UNINA-9910842491003321
Katsikas Sokratis  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human Aspects of Information Security and Assurance [[electronic resource] ] : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / / edited by Nathan Clarke, Steven Furnell
Human Aspects of Information Security and Assurance [[electronic resource] ] : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / / edited by Nathan Clarke, Steven Furnell
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XI, 367 p. 51 illus., 30 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Application software
Computer security
Data encryption (Computer science)
Computer networks - Security measures
Computer communication systems
Information Systems Applications (incl. Internet)
Systems and Data Security
Cryptology
Mobile and Network Security
Computer Communication Networks
ISBN 3-030-57404-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees’ Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users’ Software Robustness -- Security Policy -- SMEs’ Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- “Most Companies Share Whatever They Can to Make Money!”: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions.
Record Nr. UNISA-996465450903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / / edited by Nathan Clarke, Steven Furnell
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / / edited by Nathan Clarke, Steven Furnell
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XI, 367 p. 51 illus., 30 illus. in color.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Application software
Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer and Information Systems Applications
Data and Information Security
Cryptology
Mobile and Network Security
Computer Communication Networks
ISBN 3-030-57404-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees’ Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users’ Software Robustness -- Security Policy -- SMEs’ Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- “Most Companies Share Whatever They Can to Make Money!”: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions.
Record Nr. UNINA-9910427691203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT Systems Security and Privacy Protection : 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings / / edited by Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis
ICT Systems Security and Privacy Protection : 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings / / edited by Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis
Autore Pitropakis Nikolaos
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (509 pages)
Disciplina 004
Altri autori (Persone) KatsikasSokratis
FurnellSteven
MarkantonakisKonstantinos
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computers
Computer networks
Cryptography
Data encryption (Computer science)
Computing Milieux
Computer Communication Networks
Cryptology
ISBN 3-031-65175-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. -- Rasd: Semantic Shift Detection and Adaptation for Multi-Classification NIDS. -- Reduce to the MACs - Privacy Friendly Generic Probe Requests. -- PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers. -- Keep your memory dump shut: Unveiling data leaks in password managers. -- DryJIN: Detecting Information Leaks in Android Applications. -- Bruteware: A Novel Family of Cryptoviral Attacks. -- Towards Practical Hardware Fingerprinting for Remote Attestation. -- Examining the Strength of Three Word Passwords. -- Can Synthetic Data preserve Manifold properties?. -- ”Alexa, How Do You Protect My Privacy?” A Quantitative Study of User Preferences and Requirements about Smart Speaker Privacy Settings. -- Putting Authorization Servers on User-owned Devices in User-Managed Access. -- Identification of cyber threats and vulnerabilities in Norwegian distribution networks. -- Chain of trust: Unraveling references among Common Criteria certified products. -- LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. -- Satellite: Effective and Efficient Stack Memory Protection Scheme for Unsafe Programming Languages. -- Neurosymbolic learning in the XAI framework for enhanced cyberattack detection with expert knowledge integration. -- Transforming EU Governance: The Digital Integration through EBSI and GLASS. -- Malicious Insider Threat Detection Using Sentiment Analysis Of Social Media Topics. -- A Structural-Semantic Approach Integrating Graph-based and Large Language Models Representation to Detect Android Malware. -- Session Replication Attack through QR Code Sniffing in Passkey CTAP Registration. -- GAD: A Real-time Gait Anomaly Detection System with Online Adaptive Learning. -- Queuing Theoretic Analysis of Dynamic Attribute-based Access Control Systems. -- IPEQ: Querying Multi-Attribute Records with Inner Product Encryption. -- Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System. -- Cognition Behind Access Control: A Usability Comparison of Rule and Category-based Mechanisms. -- Obfuscating Code Vulnerabilities against Static Analysis in Android Apps. -- Large Scale Heap Dump Embedding for Machine Learning: Predicting OpenSSH Key Locations. -- Multi-Method Approach to Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management. -- Detecting Web Bots via Keystroke Dynamics. -- Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment. -- Cross-validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. -- Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size. -- Predicting the execution time of secure neural network inference.
Record Nr. UNINA-9910878069103321
Pitropakis Nikolaos  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security and Privacy [[electronic resource] ] : 7th International Conference, ICISSP 2021, Virtual Event, February 11–13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9–11, 2022, Revised Selected Papers / / edited by Paolo Mori, Gabriele Lenzini, Steven Furnell
Information Systems Security and Privacy [[electronic resource] ] : 7th International Conference, ICISSP 2021, Virtual Event, February 11–13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9–11, 2022, Revised Selected Papers / / edited by Paolo Mori, Gabriele Lenzini, Steven Furnell
Autore Mori Paolo
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (137 pages)
Disciplina 005.8
Altri autori (Persone) LenziniGabriele
FurnellSteven
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks—Security measures
Software engineering
Computer engineering
Computer networks
Data and Information Security
Cryptology
Mobile and Network Security
Security Services
Software Engineering
Computer Engineering and Networks
ISBN 3-031-37807-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet -- Zero Update Encryption Adjustment on Encrypted Database Queries -- Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy -- Improving Data Security and Privacy for Ontology based Data Access -- Experimentally Obtained Differential-linear Distinguishers for Permutations of ASCON and DryGASCON -- A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware.
Record Nr. UNISA-996546823703316
Mori Paolo  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui