top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data and Applications Security and Privacy XXXVIII : 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings / / edited by Anna Lisa Ferrara, Ram Krishnan
Data and Applications Security and Privacy XXXVIII : 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings / / edited by Anna Lisa Ferrara, Ram Krishnan
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (347 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computers
Artificial intelligence
Data structures (Computer science)
Information theory
Database management
Application software
Data and Information Security
Computing Milieux
Artificial Intelligence
Data Structures and Information Theory
Database Management System
Computer and Information Systems Applications
ISBN 9783031651724
9783031651717
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
Record Nr. UNINA-9910874679503321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16–20, 2024, Proceedings / / edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar
Information Systems Security : 20th International Conference, ICISS 2024, Jaipur, India, December 16–20, 2024, Proceedings / / edited by Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar
Autore Patil Vishwas T
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (501 pages)
Disciplina 005.8
Altri autori (Persone) KrishnanRam
ShyamasundarRudrapatna K
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 9783031800207
3031800206
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- System Security. -- Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms. -- An OS support for Tamper-resistant Software Execution Using Empty Interruptions. -- S-RFUP: Secure Remote Firmware Update Protocol. -- Securing Virtual Reality Apps Inter-Process Communication. -- Network Security. -- Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites. -- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. -- BP-MAP: A Secure and Convenient Mutual Authentication Protocol. -- Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. -- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF). -- From Traits to Threats: Learning Risk Indicators of Malicious Insider using Psychometric Data. -- Identifying Insecure Network Configurations through Attack Modeling and Explainable AI. -- QIris: Quantum Implementation of Rainbow Table Attacks. -- Malware and Vulnerability Detection. -- Insights from Running 24 Static Analysis Tools on Open Source Software Repositories. -- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training using GANs. -- Semantics-Based Static Vulnerability Detection of Solidity Using Abstract Interpretation. -- Privacy & Usability. -- Web Privacy Perceptions Amongst Indian Users. -- Enabling Privacy in IT Service Operations. -- Privacy-Preserving Photo Sharing: An SSI Use Case. -- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol. -- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness. -- A Decoupling Mechanism for Transaction Privacy. -- AI Security. -- Protecting ownership of trained DNN models with Zero-Knowledge Proofs. -- MALAI: ML-based Attack on Learning With Error problem. -- Patch based backdoor attack on Deep Neural Networks. -- Industry Demo/Practice. -- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy. -- Ontologies for WAF configurations: when knowledge-graphs help troubleshooting. -- IntelliSOAR: Intelligent Alert Enrichment using Security Orchestration Automation and Response (SOAR). -- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment system for Zero Trust Network.
Record Nr. UNISA-996635664203316
Patil Vishwas T  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure knowledge management in the artificial intelligence era9th international conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021 proceedings / / edited by Ram Krishnan [and four others]
Secure knowledge management in the artificial intelligence era9th international conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021 proceedings / / edited by Ram Krishnan [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (212 pages)
Disciplina 658.4038
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Information technology - Security measures
Knowledge management
ISBN 3-030-97532-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464551403316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure knowledge management in the artificial intelligence era9th international conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021 proceedings / / edited by Ram Krishnan [and four others]
Secure knowledge management in the artificial intelligence era9th international conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021 proceedings / / edited by Ram Krishnan [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (212 pages)
Disciplina 658.4038
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Information technology - Security measures
Knowledge management
ISBN 3-030-97532-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910548173103321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui