top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Autore Skopik Florian
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (456 pages)
Disciplina 005.8
Altri autori (Persone) NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00644-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 5th Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025): WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools -- An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students -- Challenges in adapting an industrial training course for academia – a cybersecurity risk management course case study -- Psychological and Behavioral aspects and system dynam-ics: insights from exercises using a cyber range -- Cybersecurity Micro-credentials and Career Path Design: the Digital4Security Good Practices -- On Demand Cybersecurity Sandboxes Through Kubernetes -- Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 5th International Workshop on Security Testing and Monitoring (STAM 2025): Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions -- LLMs in Security Testing and Monitoring: An Initial Study -- A decentralized PUF-based scheme for Remote Attestation -- Evaluating DAVS Approach for Docker Images Static Analysis -- SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks -- An Intelligent Network Fuzzer with an Application in DICOM Protocol Testing -- Detection of Adversarial Examples by Adversarial Training: a Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks -- NERO Training Methodology and Initial Results. 8th International Workshop on Emerging Network Security (ENS 2025): Proposition of IT platform for combating wildfires with Decision Support System -- Steganographic Channels in Body Area Networks -- SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning -- Real-world Identity and Access Management scenarios simulations in the SILVANUS Project -- 5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities.
Record Nr. UNINA-9911020415603321
Skopik Florian  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Autore Skopik Florian
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (522 pages)
Disciplina 005.8
Altri autori (Persone) NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00642-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025): FL-AdvGNN: A Federated Privacy-Preserving Framework of Adversarial Graph Neural Networks -- Digital twin technology for sustainable shipping: establishing cyber-security challenges and opportunities -- Red vs. Blue Team Training Scenarios for 5G/6G Networks -- LLM-Enhanced Intrusion Detection for Containerized Applications: A Two-tier Strategy for SDN and Kubernetes Environments -- A Cyber-Resilient DICE Architecture for Resource-Constrained Devices -- NullJack: An open approach for undetectable ethernet port scanning -- Group Signatures for Secure and Reliable Industrial Data Collaboration -- Real-time digital ecosystems: Integrating Virtual Personas and Digital Twins through Microservices -- Behind Enemy Lines: Strengthening Android Malware Detection with Adversarial Training. 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025): Novel approximations of elementary functions in zero-knowledge proofs -- Relaxing the Single Point of Failure in Quantum Key Distribution Networks: an Overview of Multi-Path Approaches -- b4M: Holistic Benchmarking for MPC -- A Cloud-based Multifactor Authentication Scheme Using Post-Quantum Cryptography and Trusted Execution Environments. First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025): Data Poisoning in FL: Clipping Malicious Updates -- Supporting Human-Robot Collaboration and Safety with the Proposed Explainable Neuro-symbolic Reasoning -- Towards a Metric to Assess Neural Network Resilience Against Adversarial Samples -- Evaluating Fine-Tuned LLMs for AI Text Detection. 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025): Side-Channel Analysis of OpenVINO-based Neural Network Models -- Optimizing IoT Attack Detection in Edge AI: A Comparison of Lightweight Machine Learning and Feature Reduction Techniques -- Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation Compliance -- Integrating Quantum Key Distribution into Academic Network: Practical Challenges and Solutions -- Kerberos-Authenticated Classical Channel for Quantum Key Distribution: A Symmetric-Key Approach to Quantum-Safe Authentication.
Record Nr. UNINA-9911020426603321
Skopik Florian  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Autore Skopik Florian
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (456 pages)
Disciplina 005.8
Altri autori (Persone) NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00644-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 5th Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025): WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools -- An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students -- Challenges in adapting an industrial training course for academia – a cybersecurity risk management course case study -- Psychological and Behavioral aspects and system dynam-ics: insights from exercises using a cyber range -- Cybersecurity Micro-credentials and Career Path Design: the Digital4Security Good Practices -- On Demand Cybersecurity Sandboxes Through Kubernetes -- Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 5th International Workshop on Security Testing and Monitoring (STAM 2025): Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions -- LLMs in Security Testing and Monitoring: An Initial Study -- A decentralized PUF-based scheme for Remote Attestation -- Evaluating DAVS Approach for Docker Images Static Analysis -- SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks -- An Intelligent Network Fuzzer with an Application in DICOM Protocol Testing -- Detection of Adversarial Examples by Adversarial Training: a Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks -- NERO Training Methodology and Initial Results. 8th International Workshop on Emerging Network Security (ENS 2025): Proposition of IT platform for combating wildfires with Decision Support System -- Steganographic Channels in Body Area Networks -- SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning -- Real-world Identity and Access Management scenarios simulations in the SILVANUS Project -- 5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities.
Record Nr. UNISA-996673180203316
Skopik Florian  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Availability, Reliability and Security : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / / edited by Florian Skopik, Vincent Naessens, Bjorn De Sutter
Autore Skopik Florian
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (522 pages)
Disciplina 005.8
Altri autori (Persone) NaessensVincent
De SutterBjorn
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 3-032-00642-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025): FL-AdvGNN: A Federated Privacy-Preserving Framework of Adversarial Graph Neural Networks -- Digital twin technology for sustainable shipping: establishing cyber-security challenges and opportunities -- Red vs. Blue Team Training Scenarios for 5G/6G Networks -- LLM-Enhanced Intrusion Detection for Containerized Applications: A Two-tier Strategy for SDN and Kubernetes Environments -- A Cyber-Resilient DICE Architecture for Resource-Constrained Devices -- NullJack: An open approach for undetectable ethernet port scanning -- Group Signatures for Secure and Reliable Industrial Data Collaboration -- Real-time digital ecosystems: Integrating Virtual Personas and Digital Twins through Microservices -- Behind Enemy Lines: Strengthening Android Malware Detection with Adversarial Training. 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025): Novel approximations of elementary functions in zero-knowledge proofs -- Relaxing the Single Point of Failure in Quantum Key Distribution Networks: an Overview of Multi-Path Approaches -- b4M: Holistic Benchmarking for MPC -- A Cloud-based Multifactor Authentication Scheme Using Post-Quantum Cryptography and Trusted Execution Environments. First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025): Data Poisoning in FL: Clipping Malicious Updates -- Supporting Human-Robot Collaboration and Safety with the Proposed Explainable Neuro-symbolic Reasoning -- Towards a Metric to Assess Neural Network Resilience Against Adversarial Samples -- Evaluating Fine-Tuned LLMs for AI Text Detection. 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025): Side-Channel Analysis of OpenVINO-based Neural Network Models -- Optimizing IoT Attack Detection in Edge AI: A Comparison of Lightweight Machine Learning and Feature Reduction Techniques -- Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation Compliance -- Integrating Quantum Key Distribution into Academic Network: Practical Challenges and Solutions -- Kerberos-Authenticated Classical Channel for Quantum Key Distribution: A Symmetric-Key Approach to Quantum-Safe Authentication.
Record Nr. UNISA-996673179603316
Skopik Florian  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart log data analytics : techniques for advanced security analysis / / Florian Skopik, Markus Wurzenberger, Max Landauer
Smart log data analytics : techniques for advanced security analysis / / Florian Skopik, Markus Wurzenberger, Max Landauer
Autore Skopik Florian
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (210 pages)
Disciplina 005.16
Soggetto topico Data logging
ISBN 3-030-74450-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464391203316
Skopik Florian  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Log Data Analytics : Techniques for Advanced Security Analysis / / by Florian Skopik, Markus Wurzenberger, Max Landauer
Smart Log Data Analytics : Techniques for Advanced Security Analysis / / by Florian Skopik, Markus Wurzenberger, Max Landauer
Autore Skopik Florian
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (210 pages)
Disciplina 005.16
Collana Computer Science Series
Soggetto topico Data protection
Machine learning
Computer security
Data mining
Pattern recognition systems
Data and Information Security
Machine Learning
Principles and Models of Security
Data Mining and Knowledge Discovery
Automated Pattern Recognition
ISBN 3-030-74450-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto I1 -- Introduction -- 1.1 State of the art in security monitoring and anomaly detection -- 1.2 Current trends -- 1.3. future challenges -- 1.4 Log data analysis: today and tomorrow -- 1.5 Smart log data analytics: Structure of the book -- 1.6 Try it out: Hands-on examples throughout the book -- 2 Survey on log clustering approaches -- 2.1 Introduction. 2.2 Survey background -- 2.1 The nature of log data. 2.2 Static clustering -- 2.3 Dynamic clustering -- 2.4 Applications in the security domain -- 2.3 Survey method -- 2.3.1 Set of criteria -- 2.3.2 Literature search -- 2.4 Survey results -- 2.4.1 Purpose and applicability (P) -- 2.4.2 Clustering techniques (C) -- 2.4.3 Anomaly detection (AD) -- 2.4.4 Evaluation (E). 2.4.5 Discussion -- 2.5 Conclusion -- 3 Incremental log data clustering for processing large amounts of data online -- 3.1 Introduction -- 3.2 Concept for incremental clustering -- 3.2.1 Incremental clustering -- 3.2.2 Description of model -- 3.2.3 String metrics -- 3.2.4 Description of model M1.‑‑ 3.2.5 Time series analysis -- 3.3 Outlook and further development -- 3.4 Try it out -- 3.4.1 Exim Mainlog -- 3.4.2 Messages log file -- 4 Generating character-based templates for log data -- 4.1 Introduction -- 4.2 Concept for generating character-based templates -- 4.3 Cluster template generator algorithms4.3.1 Initial matching -- 4.3.2 Merge algorithm.-4.3.3 Length algorithm -- 4.3.4 Equalmerge algorithm -- 4.3.5 Token_char algorithm -- 4.3.6 Comparison -- 4.4 Outlook and further development -- 4.5 Try it out -- 4.5.1 Exim Mainlog -- 5 Time series analysis for temporal anomaly detection5.1 Introduction -- 5.2 Concept for dynamic clustering and AD -- 5.3 Cluster evolution -- 5.3.1 Clustering model -- 5.3.2 Tracking -- 5.3.3 Transitions -- 5.3.4 Evolution metrics -- 5.4 Time series analysis -- 5.4.1 Model -- 5.4.2 Forecast -- 5.4.3 Correlation -- 5.4.4 Detection -- 5.5 Example -- 5.5.1 Long-term analysis of Suricata logs -- 5.5.2 Short-term analysis of Audit logs -- 6 AECID: A light-weight log analysis approach for online anomaly detection -- 6.1 Introduction -- 6.2 The AECID approach -- 6.2.1 AMiner -- 6.2. AECID central -- 6.2. Detecting anomalies -- 6.2. Rule generator -- 6.2. Correlation engine -- 6.2. Detectable anomalies -- 6. System deployment and operation -- 6. Application scenarios -- 6. Try it out -- 6.5.1 Configuration of the AMiner for AIT-LDSv1. - 6.5.2 Apache Access logs -- 6.5.3 Exim Mainlog file -- 6.5.4 Audit logs -- 7. A concept for a tree-based log parser generator -- 7.1 Introduction -- 7.2 Tree-based parser concept -- 7.3 AECID-PG: tree-based log parser generator -- 7.3.1 Challenges when generating tree-like parsers -- 7.3.2 AECID-PG concept -- 7.3.3 AECID-PG rules -- 7.3.4 Features -- 7.4 Outlook and further application -- 7.5 Try it out -- 7.5.1 Exim Mainlog -- 7.5.2 Audit logs -- 8 Variable type detector for statistical analysis of log tokens -- 8.1 Introduction.-.-8.2 Variable type detector concept -- 8.3 Variable type detector algorithm -- 8.3.1 Sanitize log data -- 8.3.2 Initialize types -- 8.3.3 Update types -- 8.3.4 Compute indicators -- 8.3.5 Select tokens -- 8.3.6 Compute indicator weights -- 8.3.7 Report anomalies -- 8.4 Try it out -- 8.4.1 Apache Access log -- 9. Final remarks.
Record Nr. UNINA-9910495198303321
Skopik Florian  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui