Foundations and Practice of Security : 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I / / edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro |
Autore | Mosbah Mohamed |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (468 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
SèdesFlorence
TawbiNadia AhmedToufik Boulahia-CuppensNora Garcia-AlfaroJoaquin |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer engineering Computer networks Data and Information Security Computer Engineering and Networks Computer Communication Networks |
ISBN | 3-031-57537-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World–Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response. |
Record Nr. | UNINA-9910855382203321 |
Mosbah Mohamed | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations and Practice of Security : 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part II / / edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (XIX, 106 p. 33 illus., 19 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Data and Information Security |
ISBN | 3-031-57540-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Short Papers -- UCAT: the Uniform Categorization for Access Control -- Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach -- Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection -- Evaluating Deep Learning for Cross-Domains Fake News Detection -- Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting -- Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication -- SADIS: real-time sound-based anomaly detection for industrial systems -- A resilience Component for a Digital Twin. |
Record Nr. | UNINA-9910855382703321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations and Practice of Security [[electronic resource] ] : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 361 p. 83 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data protection Coding theory Information theory Computer communication systems Biometrics (Biology) Algorithms Cryptology Security Coding and Information Theory Computer Communication Networks Biometrics Algorithm Analysis and Problem Complexity |
ISBN | 3-319-51966-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security. |
Record Nr. | UNISA-996466081303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations and Practice of Security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / edited by Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 361 p. 83 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data protection Coding theory Information theory Computer communication systems Biometrics (Biology) Algorithms Cryptology Security Coding and Information Theory Computer Communication Networks Biometrics Algorithm Analysis and Problem Complexity |
ISBN | 3-319-51966-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics -- Privacy and Verification -- Crypto and Communication Security -- Malware and Antivirus -- Web, Cloud, and Delegation -- Physical Security. |
Record Nr. | UNINA-9910484048903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations and Practice of Security [[electronic resource] ] : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 383 p. 90 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Software engineering
Application software Information technology Business—Data processing Management information systems Computer science Optical data processing Software Engineering Information Systems Applications (incl. Internet) IT in Business Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-37119-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. |
Record Nr. | UNISA-996465615903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations and Practice of Security : 5th International Symposium on Foundations and Practice of Security, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 383 p. 90 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Software engineering
Application software Information technology Business—Data processing Management information systems Computer science Optical data processing Software Engineering Information Systems Applications (incl. Internet) IT in Business Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-642-37119-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptography and Information Theory -- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic Protocols -- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes -- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities -- COMPASS: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network Users through the Social Graph -- A Formal Derivation of Composite Trust -- Policies and Applications Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy in the Java Security Manager -- A Novel Obfuscation: Class Hierarchy Flattening -- RESource: A Framework for Online Matching of Assembly with Open Source Code -- Touchjacking Attacks on Web in Android, iOS, and Windows Phone -- Network and Adaptive Security -- Short-Term Linkable Group Signatures with Categorized Batch Verification -- GHUMVEE: Efficient, Effective, and Flexible Replication -- Extracting Attack Scenarios Using Intrusion Semantics -- On Securely Manipulating XML Data -- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks -- QoS Aware Adaptive Security Scheme for Video Streaming in MANETs -- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC -- Short Papers -- Towards Modelling Adaptive Attacker’s Behaviour -- Scalable Deniable Group Key Establishment -- Information-Theoretic Foundations of Differential Privacy. |
Record Nr. | UNINA-9910741162403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|