top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Computer Security. ESORICS 2023 International Workshops [[electronic resource] ] : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Autore Katsikas Sokratis
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (785 pages)
Disciplina 005.8
Altri autori (Persone) AbieHabtamu
RaniseSilvio
VerderameLuca
CambiasoEnrico
UgarelliRita
PraçaIsabel
LiWenjuan
MengWeizhi
FurnellSteven
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computers
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Cryptology
Computing Milieux
Computer Engineering and Networks
Data and Information Security
Computer Communication Networks
ISBN 3-031-54129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification.
4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives.
5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee.
Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study.
3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger.
Record Nr. UNISA-996589546603316
Katsikas Sokratis  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Computer Security. ESORICS 2023 International Workshops : CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II / / edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
Autore Katsikas Sokratis
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (785 pages)
Disciplina 005.8
Altri autori (Persone) AbieHabtamu
RaniseSilvio
VerderameLuca
CambiasoEnrico
UgarelliRita
PraçaIsabel
LiWenjuan
MengWeizhi
FurnellSteven
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Cryptography
Data encryption (Computer science)
Computers
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Cryptology
Computing Milieux
Computer Engineering and Networks
Data and Information Security
Computer Communication Networks
ISBN 9783031541292
3031541294
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents - Part II -- Contents - Part I -- CPS4CIP 2023 -- CPS4CIP 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee -- External Reviewer -- An Opportunity-Based Approach to Information Security Risk -- 1 Introduction -- 2 Related Research -- 2.1 Risk Management -- 2.2 Research Questions -- 3 Research Method -- 4 Results -- 4.1 Definition of Risk -- 4.2 Risk Description -- 4.3 Sample Case - Use of Risk Description Strategies -- 4.4 Positive Risk Assessment -- 5 Summary and Conclusion -- References -- A Methodology for Cybersecurity Risk Assessment in Supply Chains -- 1 Introduction -- 2 Related Work -- 3 Security Risk Assessment Methodology -- 3.1 Asset Types -- 3.2 Threat Types -- 3.3 Vulnerability Types -- 3.4 Supply Chain Risk Assessment -- 3.5 Questionnaire -- 4 Preliminary Validation of the Methodology -- 4.1 Security Experts -- 4.2 Fictional Scenario -- 4.3 Result Discussion -- 5 Conclusion -- References -- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations -- 1 Introduction -- 2 Related Work -- 3 IM-DISCO -- 3.1 Formalization of Concepts -- 3.2 Railway Example -- 3.3 Predicate Generation -- 3.4 Invariant Rule Mining -- 3.5 Summary -- 4 Implementation -- 5 Evaluation -- 5.1 Data Collection and Experiment Setup -- 5.2 Evaluation Metrics -- 5.3 Operational Mode Inference (RQ. 1) -- 5.4 Anomaly Detection (RQ. 2) -- 5.5 Invariant Rules Verification and Validation (RQ. 3) -- 6 Conclusion -- References -- Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework -- 1 Introduction -- 2 State-of-The-Art -- 2.1 Accuracy vs Explainability Dichotomy -- 2.2 Classification Rule Mining -- 2.3 Rule Uncertainty -- 3 RUGE Framework -- 3.1 Phase 1: Rule Mining -- 3.2 Phase 2: Rules Selection.
4 Intrusion Detection Case Study: A CICIDS2017 Testbed -- 4.1 Dataset and Data Preprocessing -- 4.2 Scenario and Configuration -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Labeling NIDS Rules with MITRE ATT& -- CK Techniques Using ChatGPT -- 1 Introduction -- 2 Background -- 2.1 Cyber Threat Intelligence -- 2.2 Generative Pre-trained Transformers -- 3 Related Work on Language Models for CTI Labeling -- 3.1 Non-networking-based CTI Labeling -- 3.2 Networking-Based CTI Labeling -- 4 Labeling NIDS Rules with MITRE ATT& -- CK Techniques -- 4.1 GPT-Based Labeling -- 4.2 Keyword-Based Labeling (KB) -- 4.3 Post-processing -- 5 Evaluation -- 5.1 Evaluation Set -- 5.2 Performance Metrics -- 5.3 Experimental Setup -- 5.4 Results -- 5.5 Discussion -- 6 Conclusions and Future Work -- A Appendix: Chat-GPT Prompt Templates -- References -- User Behavior Analysis for Malware Detection -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Enduser Host -- 3.2 Smart Behavior Analysis (SBA) -- 3.3 Metrics -- 4 Machine Learning Model -- 4.1 Autoencoder Model -- 4.2 Kernel Density Estimation Model -- 5 Model Accuracy and Validation -- 5.1 Training Data -- 5.2 Test Data -- 5.3 Metric Relevancy -- 5.4 Models' Comparison -- 5.5 False Positive Reduction -- 6 Conclusion -- References -- Balancing XAI with Privacy and Security Considerations -- 1 Introduction -- 2 Background -- 2.1 XAI Taxonomy Classes -- 2.2 Evaluation Criteria and Methods -- 3 Findings -- 3.1 Privacy Attacks -- 3.2 Privacy Defences -- 3.3 Security Aspects -- 4 Conclusions -- References -- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection -- 1 Introduction -- 2 Related work -- 3 Methodology -- 3.1 Overview of Approach -- 3.2 Dataset Refinement with XAI -- 3.3 Attack Detection -- 3.4 Attack Identification.
4 Results and Evaluation -- 4.1 Dataset and Experimental Environment -- 4.2 Performance Metrics -- 4.3 Experimental Evaluation on CIC-IDS Dataset -- 5 Conclusions -- References -- Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges*-10pt -- 1 Introduction -- 2 Challenges of Digital Twins -- 2.1 Security -- 2.2 Privacy -- 2.3 Trust -- 2.4 Safety -- 3 Digital Twins in Healthcare -- 3.1 Ethical Concerns of Digital Twins in Healthcare -- 3.2 Threat Landscape in Healthcare -- 4 IoT Digital Twins: Challenges and Conflict Analysis -- 4.1 Security vs. Safety -- 4.2 Security vs. Privacy -- 4.3 Security vs. Operational Requirements -- 4.4 Security vs. Trust -- 5 Summary and Conclusion -- References -- ADIoT 2023 -- ADIoT 2023 Preface -- Organization -- General Co-chair -- Program Co-chairs -- Local Chairs -- Technical Program Committee -- Steering Committee -- Subreviewer -- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving -- 1 Introduction -- 2 Preliminaries -- 3 Related Work -- 3.1 Threat Modeling -- 3.2 Risk Assessment -- 3.3 Digital Dependability Identities -- 3.4 Automotive Security Surveys -- 3.5 Insights from Literature Review -- 4 C-TAR Method Description -- 4.1 First Phase - C-TAR Input -- 4.2 Second Phase - Compatibility Conditions -- 4.3 Third Phase - Compatibility Statement -- 5 Example -- 5.1 First Phase - C-TAR Input -- 5.2 Second Phase - Compatibility Conditions -- 5.3 Third Phase - Compatibility Statement -- 6 Conclusion -- References -- The VOCODES Kill Chain for Voice Controllable Devices -- 1 Introduction -- 2 Related Work -- 3 The VOCODES Kill Chain -- 3.1 Steps -- 3.2 Discussion -- 4 Applying VOCODES to Alexa vs Alexa -- 4.1 Reconnaissance -- 4.2 Audio Weaponization -- 4.3 Initial Foothold -- 4.4 Exploitation -- 4.5 Persistence -- 4.6 Actions on Objectives.
5 Conclusions -- References -- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network -- 1 Introduction -- 2 Background on RPL and DETONAR -- 2.1 RPL -- 2.2 DETONAR -- 2.3 RADAR -- 3 DETONAR-Light Design -- 3.1 Running DETONAR Using Data Collected at a Border Router -- 3.2 DETONAR Adaptation to Contiki-NG and Cooja -- 4 Experiments -- 4.1 Attack Implementation in Contiki-NG -- 4.2 Setup -- 4.3 Metrics -- 5 Results -- 5.1 Attack Detection and Classification for Networks Without Packet Loss -- 5.2 Attack Detection and Classification for Networks with Packet Loss -- 6 Discussion and Limitations -- 7 Conclusions -- References -- Firmware-Based DoS Attacks in Wireless Sensor Network -- 1 Introduction -- 2 Background -- 3 Threat Scenario -- 3.1 Assumption -- 3.2 Vulnerable Code -- 4 Attack Simulation -- 5 Defensive Mechanism -- 6 Related Work -- 7 Conclusion -- Appendix -- References -- Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime -- 1 Introduction -- 2 Pairing Definitions -- 3 Our Batch Delegation Protocols -- 3.1 Input Scenario: "017E A Private Online, "017E B Public Online -- 3.2 Input Scenario: "017E A and "017E B Public Online -- 3.3 Input Scenario: "017E A Private Online and "017E B Public Offline -- 3.4 Input Scenario: "017E A Public Online, "017E B Public Offline -- 3.5 Input Scenario: "017E A and "017E B="017E sH Private Online -- 4 Practical Performance Analysis of Our Protocols -- 5 Conclusions -- A Formal Definitions -- References -- SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Implementation -- 5 Example -- 6 Conclusion and Future Work -- References -- SecAssure 2023 -- SecAssure 2023 Preface -- Organization -- General Chairs -- Program Committee Chairs -- Program Committee.
Additional Reviewers -- Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms -- 1 Introduction -- 2 Comparison Criteria -- 2.1 Application Domains -- 2.2 Team Formation -- 2.3 Methods of Experimentation -- 2.4 Infrastructure Technologies -- 2.5 Front-End Technologies -- 2.6 Scenario -- 2.7 Topology Generation -- 2.8 Accessibility -- 2.9 Traffic -- 2.10 User Modeling -- 2.11 Data Collection and Analysis -- 2.12 Scoring and Reporting -- 2.13 Ownership and License -- 3 Comparison of Cyber Ranges Solutions -- 3.1 Analysis -- 3.2 Overall Comparison -- 4 Scenario and Topology Generation -- 4.1 SecGen -- 4.2 CyExec* -- 5 Discussion and Open Challenges -- 6 Conclusion -- References -- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Motivational Scenario -- 5 Forkfuzz -- 5.1 Setup Step -- 5.2 Execution Step -- 5.3 Termination Step -- 6 Evaluation -- 6.1 Dining Philosophers Problem -- 6.2 Producer-Consumer Problem -- 6.3 Web Server -- 6.4 Performance -- 7 Discussion -- 7.1 Limitations -- 7.2 Aggregated Coverage -- 7.3 Areas of Improvement -- 8 Concluding Remarks -- References -- Trust Assumptions in Voting Systems -- 1 Introduction -- 2 Paper-Based Voting in a Polling Station -- 2.1 Regular Paper Voting -- 2.2 Paper Voting with Cryptographic Receipts -- 3 Postal Voting -- 3.1 Regular Postal Voting -- 3.2 Postal Voting with Cryptographic Receipts -- 4 Voting via Voting Machines -- 4.1 Voting Machines Used in Bulgaria -- 5 Internet Voting -- 5.1 Estonian IVXV -- 6 Discussion and Conclusions -- 6.1 Overview of the Trust Assumptions -- 6.2 Comparative Analysis of the Trust Assumptions -- References -- Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle -- 1 Introduction -- 2 Summary of RR-Cycle and Case Study.
3 IoT Model in IIIf, Attack Trees Analysis and Refinement to Distributed Ledger.
Record Nr. UNINA-9910842491003321
Katsikas Sokratis  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study.
Record Nr. UNINA-9910991173303321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Computer Security. ESORICS 2024 International Workshops : SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16–20, 2024, Revised Selected Papers, Part II / / edited by Joaquin Garcia-Alfaro, Harsha Kalutarage, Naoto Yanai, Rafał Kozik, Paweł Ksieniewicz, Michał Woźniak, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Marek Pawlicki, Michał Choraś
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 541 p. 113 illus., 94 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks - Security measures
Computers
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks
Data protection
Mobile and Network Security
Computing Milieux
Cryptology
Computer Engineering and Networks
Computer Communication Networks
Data and Information Security
ISBN 3-031-82362-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SECAI PAPERS: Feasibility Study for Supporting Static Malware Analysis Using LLM -- PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models -- Systematic Bug Reproduction with Large Language Model -- BOTracle: A framework for Discriminating Bots and Humans -- Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation -- On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks -- Effects of Poisoning Attacks on Causal Deep Reinforcement Learning -- Generating Traffic-Level Adversarial Examples from Feature-Level Specifications -- PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails -- .On the Robustness of Malware Detectors to Adversarial Samples -- Towards AI-Based Identification of Publicly Known Vulnerabilities -- Machine Learning-Based Secure Malware Detection using Features from Binary Executable Headers -- Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations -- Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware -- A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. DisA PAPERS: Recognition of Remakes and Fake Facial Images -- A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, through Feature Omission and a Committee of Classifiers -- Proposition of a Novel Type of Attacks Targeting Explainable AI Algorithms in Cybersecurity -- Data structures towards the recognition of fake news and disinformation written in Polish. CPS4CIP PAPERS: Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data -- Best Practices - based Training for Improving Cybersecurity in Power Grids -- Proactive Cyber Security Strategies for Securing Critical National Infrastructure -- Weaponizing Disinformation Against Critical Infrastructures. SecAssure PAPERS: Compliance-driven CWE Assessment by Semantic Similarity -- Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments -- MITRE-Based APT Attack Generation and Prediction -- Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection -- Formalizing Federated Learning and Differential Privacy for GIS systems in IIIf -- AI-Assisted Assurance Profile Creation for System Security Assurance -- Attack to Defend: Gamifying the MITRE ATT&CK for Cyber Security Training using the COFELET Framework -- Canary in the Coal Mine: Identifying Cyber Threat Trends through Topic Mining -- Stack Overflow Case Study.
Record Nr. UNISA-996650067803316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International Conference / / edited by Rashid Mehmood, Guillermo Hernández, Isabel Praça, Jaroslaw Wikarek, Roussanka Loukanova, Arsénio Monteiro dos Reis, Antonio Skarmeta, Eleonora Lombardi
Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International Conference / / edited by Rashid Mehmood, Guillermo Hernández, Isabel Praça, Jaroslaw Wikarek, Roussanka Loukanova, Arsénio Monteiro dos Reis, Antonio Skarmeta, Eleonora Lombardi
Autore Mehmood Rashid
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (657 pages)
Disciplina 006.3
Altri autori (Persone) HernándezGuillermo
PraçaIsabel
WikarekJaroslaw
LoukanovaRoussanka
Monteiro dos ReisArsénio
SkarmetaAntonio
LombardiEleonora
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 9783031764592
3031764595
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient Network Traffic Feature Sets for IoT Intrusion Detection -- Adversarial Evasion Attack Efficiency against Large Language Models -- ModSec-Learn: Boosting ModSecurity with Machine Learning -- SCoPE: Evaluating LLMs for Software Vulnerability Detection, etc.
Record Nr. UNINA-9910986128003321
Mehmood Rashid  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui