Foundations and Practice of Security, Kartoniert / Broschiert
Foundations and Practice of Security
- 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part I
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
- Verlag:
- Springer, 05/2025
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783031874987
- Artikelnummer:
- 12286181
- Umfang:
- 432 Seiten
- Gewicht:
- 651 g
- Maße:
- 235 x 155 mm
- Stärke:
- 24 mm
- Erscheinungstermin:
- 1.5.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Weitere Ausgaben von Foundations and Practice of Security |
Preis |
|---|---|
| Buch, Kartoniert / Broschiert, Englisch | EUR 142,37* |
Klappentext
.- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. .- The Perfect Victim? Family Offices as Targets for Cybercriminals. .- Advanced Real-Time Detection of Cyber Threat Information from Tweets. .- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. .- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. .- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. .- Automating and enhancing security mechanisms in software systems and data management. .- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. .- An Approach to Determine a System's Behavioural Security Posture. .- Secure Data Traceability for Mobile DataCollectors. .- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. .- Cybersecurity and AI when applied to emerging technologies. .- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. .- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. .- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. .- A Tool for Enabling Scalable Automation in Security Control Selection. .- Cybersecurity and Ethics. .- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. .- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. .- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. .- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. .- Parametric Automata for Dynamic Access Control Policies. .- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. .- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. .- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. .- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. .- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. .- Detecting Cyber Attacks on Electric Vehicles Charging Stations. .- New trends in advanced cryptographic protocols. .- Secure Voting Protocol Using Balance Scale. .- Monitoring the execution of cryptographic functions. .- RouterORAM: An O(1)-latency and client-work ORAM.