Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
| Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Computer networks - Security measures
Computers Cryptography Data encryption (Computer science) Computer engineering Computer networks Data protection Mobile and Network Security Computing Milieux Cryptology Computer Engineering and Networks Computer Communication Networks Data and Information Security |
| ISBN | 3-031-82362-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study. |
| Record Nr. | UNINA-9910991173303321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
| Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Computer networks - Security measures
Computers Cryptography Data encryption (Computer science) Computer engineering Computer networks Data protection Mobile and Network Security Computing Milieux Cryptology Computer Engineering and Networks Computer Communication Networks Data and Information Security |
| ISBN | 3-031-82362-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study. |
| Record Nr. | UNISA-996650067803316 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Progress on Pattern Classification, Image Processing and Communications : Proceedings of the CORES and IP&C Conferences 2023 / / edited by Robert Burduk, Michał Choraś, Rafał Kozik, Paweł Ksieniewicz, Tomasz Marciniak, Paweł Trajdos
| Progress on Pattern Classification, Image Processing and Communications : Proceedings of the CORES and IP&C Conferences 2023 / / edited by Robert Burduk, Michał Choraś, Rafał Kozik, Paweł Ksieniewicz, Tomasz Marciniak, Paweł Trajdos |
| Autore | Burduk Robert |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (241 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
ChoraśMichał
KozikRafał KsieniewiczPaweł MarciniakTomasz TrajdosPaweł |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Pattern recognition systems Signal processing Computer vision Computational Intelligence Artificial Intelligence Automated Pattern Recognition Digital and Analog Signal Processing Computer Vision |
| ISBN |
9783031416309
3031416309 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A novel approach of multi-string parsing for syntactic pattern recognition -- Hollow n-grams vectorizer for Natural Language Processing problems -- A non-deep approach to classifying movie genres based on multimodal data -- Incremental Extreme Learning Machine for Binary Data Stream Classification -- Interpreting Intrusions - The Role of Explainability in AI-based Intrusion Detection System -- Real-time deformation of three-dimensional volumetric models using mesh models -- Hyperparameters Optimization using GridSearchCV Method for TinyML models -- Analysis of the Possibility to Employ Relationship Between the Problem Complexity and the Classification Quality as Model Optimization Proxy -- Deep Learning for pit detection in cherries -- Image analysis system for augmented reality games -- Coregistration of selected sequences in MRI imaging based on edge analysis of image difference -- Actinic Keratosis Prediction Basedon Deep Learning Methods -- A New Assessment of Convolutional Neural Networks for Texture Directionality Detection -- Knowledge Distillation with Relative Representations for Image Representation Learning -- An Approach for CT Image Conversion Using Filtering Based on Quaternion Mathematics -- Exploring Text-Guided Synthetic Distribution Shifts for Robust Image Classification -- Color Tracking Application Using AI-based Docker Container Scheduling in Fog Computing -- Air pollution monitoring and information distribution system -- Detection of conspiracy theories from tweets using NLI-based Zero Shot Text Classification models -- Battery management system for Polish hybrid residential photovoltaic power plants -- Document Annotation Tool For News Content Analysis -- Dynamic time warping technique applied to the user’s intent recognition for myoelectric-based control of upper limb prosthesis -- A Hybrid Long Short-Term Memory Network Based on Wind and Rain Sensitive and its Application to PM2.5 Prediction. |
| Record Nr. | UNINA-9910767562003321 |
Burduk Robert
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||