top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 545 p. 119 illus., 101 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82349-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Establishing Secure and Privacy-Preserving Blockchain Applications Through Real World Cryptography. DPM Papers: Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering -- reteLLMe: Design rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions -- Plausible Deniability of Redacted Text -- Exploring Distribution Learning of Synthetic Data Generators for Manifolds -- HEDAS: Secure and Efficient Distributed OLAP using Fully Homomorphic Encryption -- Card-based Cryptographic Protocols for Three-input Functions with a Standard Deck of Cards Using Private Operations -- Grid-Based Decompositions for Spatial Data under Local Differential Privacy -- Balancing Privacy and Utility in Multivariate Time-Series Classification -- Dynamic k-anonymity: A Topological Framework -- Using Static Code Analysis for GDPR Compliance Checks -- Privacy-preserving tabular data generation: Systematic Literature Review -- A DPIA Repository for Interdisciplinary Data Protection Research -- Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification. CBT Papers: Route Discovery in Private Payment Channel Networks -- A comparative study of Rust smart contract SDKs for Application-Specific Blockchains -- Offchain Runtime Verification (for The Tezos Blockchain) -- Quantifying Liveness and Safety of Avalanche’s Snowball -- We will DAG you -- Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents? -- Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script -- Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol -- Benchmarking post-quantum cryptography in Ethereum-based blockchains. CyberICPS Papers: Exploring Anomaly Detection for Marine Radar Systems -- Hunting Vulnerabilities in the Maritime Domain -- Threat Modeling in Satellite Communications for Maritime Operations -- Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway -- Usage of Cybersecurity Standards in Operational Technology Systems -- Deployment Challenges of Industrial Intrusion Detection Systems -- A Framework For Applying Digital Twins To Support Incident Response -- Automated Side-Channel Analysis of ARM TrustZone-M Programs -- FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images -- Leveraging the domain experts: specializing privacy threat knowledge.
Record Nr. UNINA-9910992777903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study.
Record Nr. UNINA-9910991173303321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part I / / edited by Joaquin Garcia-Alfaro, Ken Barker, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Sergi Delgado-Segura, Sokratis Katsikas, Frédéric Cuppens, Costas Lambrinoudakis, Nora Cuppens-Boulahia, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 545 p. 119 illus., 101 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82349-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Establishing Secure and Privacy-Preserving Blockchain Applications Through Real World Cryptography. DPM Papers: Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering -- reteLLMe: Design rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions -- Plausible Deniability of Redacted Text -- Exploring Distribution Learning of Synthetic Data Generators for Manifolds -- HEDAS: Secure and Efficient Distributed OLAP using Fully Homomorphic Encryption -- Card-based Cryptographic Protocols for Three-input Functions with a Standard Deck of Cards Using Private Operations -- Grid-Based Decompositions for Spatial Data under Local Differential Privacy -- Balancing Privacy and Utility in Multivariate Time-Series Classification -- Dynamic k-anonymity: A Topological Framework -- Using Static Code Analysis for GDPR Compliance Checks -- Privacy-preserving tabular data generation: Systematic Literature Review -- A DPIA Repository for Interdisciplinary Data Protection Research -- Secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification. CBT Papers: Route Discovery in Private Payment Channel Networks -- A comparative study of Rust smart contract SDKs for Application-Specific Blockchains -- Offchain Runtime Verification (for The Tezos Blockchain) -- Quantifying Liveness and Safety of Avalanche’s Snowball -- We will DAG you -- Assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents? -- Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script -- Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol -- Benchmarking post-quantum cryptography in Ethereum-based blockchains. CyberICPS Papers: Exploring Anomaly Detection for Marine Radar Systems -- Hunting Vulnerabilities in the Maritime Domain -- Threat Modeling in Satellite Communications for Maritime Operations -- Cybersecurity Challenges in Industrial Control Systems: An Interview Study with Asset Owners in Norway -- Usage of Cybersecurity Standards in Operational Technology Systems -- Deployment Challenges of Industrial Intrusion Detection Systems -- A Framework For Applying Digital Twins To Support Incident Response -- Automated Side-Channel Analysis of ARM TrustZone-M Programs -- FrameD: Toward Automated Identication of Embedded Frameworks in Firmware Images -- Leveraging the domain experts: specializing privacy threat knowledge.
Record Nr. UNISA-996655269603316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study.
Record Nr. UNISA-996650067803316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui