top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Computer communication systems
Computer organization
Software engineering
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Computer Communication Networks
Computer Systems Organization and Communication Networks
Software Engineering
ISBN 3-030-42048-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019).
Record Nr. UNISA-996418206503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Computer Security [[electronic resource] ] : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Computer crimes
Law and legislation
Data encryption (Computer science)
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Crime
Legal Aspects of Computing
Cryptology
ISBN 3-030-42051-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019).
Record Nr. UNISA-996418207003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / / edited by Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, Angela Sasse, Weizhi Meng, Steven Furnell, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XXIII, 440 p. 282 illus., 72 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Computer networks
Computer organization
Software engineering
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Computer Communication Networks
Computer Systems Organization and Communication Networks
Software Engineering
ISBN 3-030-42048-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019).
Record Nr. UNINA-9910380747703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Computer Security : ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers / / edited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Computer crimes
Law and legislation
Data encryption (Computer science)
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Computer Crime
Legal Aspects of Computing
Cryptology
ISBN 3-030-42051-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019).
Record Nr. UNINA-9910380748003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, the Hague, the Netherlands, September 25-29, 2023, Revised Selected Papers, Part I
Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, the Hague, the Netherlands, September 25-29, 2023, Revised Selected Papers, Part I
Autore Katsikas Sokratis
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (518 pages)
Altri autori (Persone) Cuppensédéric
Cuppens-BoulahiaNora
LambrinoudakisCostas
Garcia-AlfaroJoaquin
Navarro-ArribasGuillermo
NespoliPantaleone
KalloniatisChristos
MylopoulosJohn
AntónAnnie
Collana Lecture Notes in Computer Science Series
ISBN 3-031-54204-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part I -- Contents - Part II -- Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain -- 1 Introduction -- 2 Related Work -- 2.1 Supply Chain Cyber Security -- 2.2 Cyber Security Culture -- 3 Method -- 3.1 Problem Identification and Literature Review -- 3.2 Data Collection and Analysis -- 3.3 Data Interpretation and Reporting -- 4 Results -- 4.1 Governance -- 4.2 Preparedness and Incident Response -- 4.3 Supply Chain Challenges -- 4.4 Trust -- 4.5 Looking Towards Others and Propagation of Trust -- 4.6 The Impact of Organization Size -- 5 Discussion -- 5.1 Discussion of Main Research Questions -- 5.2 Exploration of Additional Findings -- 6 Conclusion and Future Work -- References -- METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks -- 1 Introduction -- 2 Cybersecurity Research for ICSs -- 2.1 Testbeds -- 2.2 Datasets -- 2.3 Related Work -- 2.4 Toward a Cross-Domain ICS Evaluation -- 3 METRICS: A Cybersecurity Evaluation Methodology for ICSs -- 3.1 Exchangeable Evaluation Environment -- 3.2 Adversaries and Responses -- 3.3 Cross-Domain Metrics -- 3.4 Evaluation Control -- 4 Use Case: METRICS for Power Grids -- 4.1 Evaluation Phases -- 4.2 Discussion -- 5 Toward Cross-Domain Resilience -- 6 Conclusion -- A Environment Description File Example -- B Scenario Description File Example -- References -- Threat Analysis in Dairy Farming 4.0 -- 1 Introduction -- 2 Related Work -- 3 CPSs of a Dairy Farm 4.0 -- 4 Threat Modeling and Risk Assessment -- 4.1 Methodology -- 4.2 Threats and Risks in the Dairy Farm 4.0 -- 5 Conclusions -- References -- Overview of Social Engineering Protection and Prevention Methods -- 1 Introduction -- 2 Method Selection Methodology -- 3 Analysis -- 3.1 Overview of Protection Method Categories.
3.2 Criteria for Method Evaluation -- 3.3 Evaluation Results -- 3.4 Analysis of Evaluation Results -- 4 Conclusion -- References -- Skade - A Challenge Management System for Cyber Threat Hunting -- 1 Introduction -- 2 Related Work -- 3 Hypotheses Concerning Threat Hunting Training -- 3.1 Ensuring Constructive Alignment -- 3.2 Supporting Motivating Setting -- 3.3 Providing Feedback and Assessment -- 3.4 Covering Multiple Learning Dimensions -- 4 Realization of the Challenge Manager Skade -- 4.1 Features -- 4.2 Functions -- 4.3 Example Based on the Nordic-US Exercise of 2023 -- 5 Discussion -- 5.1 Skade as a Design Science Effort -- 5.2 Trainees and Requirements on Challenges -- 5.3 Interaction with Emulators -- 5.4 Learning Objectives and Learning Activities -- 5.5 Experiment Plan and Tests of Hypotheses -- 6 Conclusion -- References -- On the Usage of NLP on CVE Descriptions for Calculating Risk -- 1 Introduction -- 2 Cybersecurity Related Background -- 2.1 Common Vulnerabilities and Exposures (CVE) -- 2.2 Common Platform Enumeration (CPE) -- 2.3 Common Weakness Enumeration (CWE) -- 2.4 Common Attack Pattern Enumeration and Classification (CAPEC) -- 2.5 National Vulnerability Database (NVD) -- 2.6 Common Vulnerability Scoring System (CVSS) -- 3 Related Work -- 4 Natural Language Processing Background -- 4.1 Text Classification -- 4.2 spaCy -- 5 Implementation -- 6 Conclusion -- References -- Evaluation of an OPC UA-Based Access Control Enforcement Architecture -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Protocol Modeling -- 4 Implementation -- 5 Experiment -- 6 Results -- 6.1 Results on Connection Experiments -- 6.2 Results on Access Resource Experiments -- 6.3 Results on Different Token Expiry Times -- 6.4 Result on Different Token Sizes -- 6.5 Results on Lowering the CPU Clock Frequency of the Resource Server.
7 Suggestions on Optimizations of Session Activation -- 8 Discussion -- 8.1 Recommendations -- 8.2 Limitations and Impact -- 9 Conclusions -- References -- HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments -- 1 Introduction -- 2 Background -- 2.1 Internet Exchange Point -- 2.2 Honeypot -- 2.3 Vehicle-to-Grid (V2G) -- 3 Related Work -- 4 HoneyEVSE Honeypot -- 4.1 Architecture -- 4.2 Physical Process -- 4.3 Services and Interaction -- 4.4 Data Logging -- 5 Results -- 5.1 Interactions Analysis -- 5.2 Interactions Origin -- 6 Conclusion -- References -- DPM 2023 -- Foreword from the DPM 2023 Program Chairs -- 18th International Workshop on Data Privacy Management - DPM 2023 -- PC Chairs -- Program Committee -- Steering Committee -- Additional Reviewers -- Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce -- 1 Introduction -- 2 Background -- 3 Methodology and Research Strategy -- 3.1 Research Questions -- 4 Results -- 4.1 The `old' Ethical Dilemmas of E-Commerce -- 4.2 The `New' Ethical Dilemmas of E-Commerce -- 5 Conclusions -- References -- Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data -- 1 Introduction -- 2 Background and Related Work -- 2.1 Synthetic Data Generation -- 2.2 Membership Inference Attacks Against Synthetic Tabular Data -- 3 Attack Scenarios -- 3.1 (S0) Auxiliary -- 3.2 (S1) Black Box -- 3.3 (S2) Published -- 3.4 (S3) Upper Bound -- 4 Experimental Setup -- 4.1 Synthetic Data Generators -- 4.2 Real World Datasets -- 4.3 Meta-classifier Methods -- 4.4 Parameters of the Attack -- 5 Results -- 5.1 Query Based Attack -- 5.2 Target Attention Attack -- 5.3 Robustness Analysis for Number of Synthetic Records m -- 6 Future Work -- 6.1 Impact of Releasing Less Synthetic Records.
6.2 Differentially Private Synthetic Generation Methods -- 6.3 Bridging the Gap with the Upper Bound -- 7 Conclusion -- References -- Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption -- 1 Introduction -- 2 Proxy Re-Encryption -- 2.1 Syntax and Basic Definitions -- 2.2 Umbral's PRE Scheme -- 3 Related Work -- 4 Patient-Centric Health Data Sovereignty -- 4.1 Proposed Solution -- 4.2 Authentication/Authorisation -- 4.3 Access Delegation Scenario -- 4.4 Break-Glass Approach -- 5 Performance Analysis -- 6 Conclusion -- References -- PrivacySmart: Automatic and Transparent Management of Privacy Policies -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution and Plan of This Paper -- 2 Proposal Description -- 2.1 System Architecture Overview -- 2.2 User Privacy Preferences -- 2.3 Pop-Up Interaction Module -- 2.4 Consent Smart Contract -- 2.5 Workflow -- 3 Discussion -- 3.1 Implementation -- 3.2 Evaluation -- 4 Conclusions and Future Work -- References -- Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Collection of VTO Providers, Websites and Apps -- 3.2 Analyzing the Sharing of Users' Images on VTO Websites/Apps -- 3.3 Analyzing Privacy Policies w.r.t VTO Feature -- 3.4 Measurement of Trackers -- 3.5 Analysing VTO Service Providers -- 4 Results -- 4.1 Sharing of Users' Images on VTO Featuring Websites -- 4.2 Privacy Policy Analysis w.r.t VTO Feature on Websites -- 4.3 Sharing of Users' Images on VTO Featuring Apps -- 4.4 Privacy Policy Analysis w.r.t VTO Feature on Apps -- 4.5 Measurement of Trackers -- 4.6 Analysis of VTO Service Providers -- 5 Conclusion -- References -- Integrally Private Model Selection for Support Vector Machine -- 1 Introduction -- 2 Preliminaries -- 2.1 Support Vector Machine (SVM).
2.2 Model Comparison Attack for SVM and Integral Privacy -- 3 Methodology -- 3.1 Overview -- 3.2 Datasets -- 3.3 Creation of Partitions -- 3.4 Integrally Private SVM (IPSVM) -- 4 Results -- 4.1 Drawbacks -- 5 Conclusion and Future Work -- References -- Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach -- 1 Introduction -- 2 Preliminaries -- 2.1 Federated Learning -- 2.2 Differential Privacy -- 2.3 Temporal Fusion Transformers -- 3 Related Work -- 4 Differentially Private Federated Traffic Flow Prediction Using Temporal Fusion Transformers -- 4.1 Client-Side Training -- 4.2 Model Perturbation -- 4.3 Aggregation Algorithm -- 5 Dataset and Experimental Settings -- 6 Results and Analysis -- 7 Conclusion and Future Works -- References -- Analyzing Continuous Ks-Anonymization for Smart Meter Data -- 1 Introduction -- 2 Problem Statement and Related Work -- 3 ks-Anonymity and CASTLE -- 4 Evaluation -- 5 Conclusion -- References -- Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges -- 1 Introduction -- 2 Industrial Context -- 3 Background -- 4 Available Libraries -- 4.1 HElib -- 4.2 SEAL -- 4.3 PALISADE -- 4.4 OpenFHE -- 4.5 TFHE -- 4.6 Concrete -- 4.7 LATTIGO -- 5 Towards Real-World HE Applications: HELT -- 6 Related Work -- 7 Conclusion -- References -- AddShare: A Privacy-Preserving Approach for Federated Learning -- 1 Introduction -- 2 Background and Related Work -- 2.1 Federated Learning Attacks -- 2.2 Privacy in Federated Learning -- 3 The AddShare Approach -- 3.1 Threat Models -- 3.2 AddShare Algorithm -- 3.3 Implemented AddShare Variants -- 4 Empirical Evaluation -- 5 Results and Discussion -- 6 Conclusion -- References -- Secure Multiparty Sampling of a Biased Coin for Differential Privacy -- 1 Introduction -- 1.1 Other Background and Related Works.
1.2 Contribution.
Record Nr. UNISA-996587860003316
Katsikas Sokratis  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 545 p. 119 illus., 101 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82349-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Establishing Secure and Privacy-Preserving Blockchain Applications Through Real World Cryptography. DPM Papers: Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering -- reteLLMe: Design rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions -- Plausible Deniability of Redacted Text -- Exploring Distribution Learning of Synthetic Data Generators for Manifolds -- HEDAS: Secure and Efficient Distributed OLAP using Fully Homomorphic Encryption -- Card-based Cryptographic Protocols for Three-input Functions with a Standard Deck of Cards Using Private Operations -- Grid-Based Decompositions for Spatial Data under Local Differential Privacy -- Balancing Privacy and Utility in Multivariate Time-Series Classification -- Dynamic k-anonymity: A Topological Framework -- Using Static Code Analysis for GDPR Compliance Checks -- Privacy-preserving tabular data generation: Systematic Literature Review -- A DPIA Repository for Interdisciplinary Data Protection Research -- Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification. CBT Papers: Route Discovery in Private Payment Channel Networks -- A comparative study of Rust smart contract SDKs for Application-Specific Blockchains -- Offchain Runtime Verification (for The Tezos Blockchain) -- Quantifying Liveness and Safety of Avalanche’s Snowball -- We will DAG you -- Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents? -- Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script -- Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol -- Benchmarking post-quantum cryptography in Ethereum-based blockchains. CyberICPS Papers: Exploring Anomaly Detection for Marine Radar Systems -- Hunting Vulnerabilities in the Maritime Domain -- Threat Modeling in Satellite Communications for Maritime Operations -- Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway -- Usage of Cybersecurity Standards in Operational Technology Systems -- Deployment Challenges of Industrial Intrusion Detection Systems -- A Framework For Applying Digital Twins To Support Incident Response -- Automated Side-Channel Analysis of ARM TrustZone-M Programs -- FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images -- Leveraging the domain experts: specializing privacy threat knowledge.
Record Nr. UNINA-9910992777903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study.
Record Nr. UNINA-9910991173303321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 545 p. 119 illus., 101 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82349-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Establishing Secure and Privacy-Preserving Blockchain Applications Through Real World Cryptography. DPM Papers: Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering -- reteLLMe: Design rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions -- Plausible Deniability of Redacted Text -- Exploring Distribution Learning of Synthetic Data Generators for Manifolds -- HEDAS: Secure and Efficient Distributed OLAP using Fully Homomorphic Encryption -- Card-based Cryptographic Protocols for Three-input Functions with a Standard Deck of Cards Using Private Operations -- Grid-Based Decompositions for Spatial Data under Local Differential Privacy -- Balancing Privacy and Utility in Multivariate Time-Series Classification -- Dynamic k-anonymity: A Topological Framework -- Using Static Code Analysis for GDPR Compliance Checks -- Privacy-preserving tabular data generation: Systematic Literature Review -- A DPIA Repository for Interdisciplinary Data Protection Research -- Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification. CBT Papers: Route Discovery in Private Payment Channel Networks -- A comparative study of Rust smart contract SDKs for Application-Specific Blockchains -- Offchain Runtime Verification (for The Tezos Blockchain) -- Quantifying Liveness and Safety of Avalanche’s Snowball -- We will DAG you -- Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents? -- Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script -- Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol -- Benchmarking post-quantum cryptography in Ethereum-based blockchains. CyberICPS Papers: Exploring Anomaly Detection for Marine Radar Systems -- Hunting Vulnerabilities in the Maritime Domain -- Threat Modeling in Satellite Communications for Maritime Operations -- Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway -- Usage of Cybersecurity Standards in Operational Technology Systems -- Deployment Challenges of Industrial Intrusion Detection Systems -- A Framework For Applying Digital Twins To Support Incident Response -- Automated Side-Channel Analysis of ARM TrustZone-M Programs -- FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images -- Leveraging the domain experts: specializing privacy threat knowledge.
Record Nr. UNISA-996655269603316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study.
Record Nr. UNISA-996650067803316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXVI [[electronic resource] ] : 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedings / / edited by Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro
Data and Applications Security and Privacy XXVI [[electronic resource] ] : 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012, Proceedings / / edited by Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 340 p. 91 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Computer communication systems
Management information systems
Computer science
Data encryption (Computer science)
Application software
Data mining
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
Cryptology
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
ISBN 3-642-31540-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465374403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui