Atjaunināt sīkdatņu piekrišanu

E-grāmata: Foundations and Practice of Security: 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 14551
  • Izdošanas datums: 24-Apr-2024
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031575372
  • Formāts - EPUB+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 14551
  • Izdošanas datums: 24-Apr-2024
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031575372

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11–13, 2023.

The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections:

Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.

Part II : security design, short papers. 

 

AI and Cybersecurity.- An Adversarial Robustness Benchmark for
Enterprise Network Intrusion Detection.- Securing Smart Vehicles through
Federated Learning.- Using Reed-Muller Codes for Classification with
Rejection and Recovery.- Unsupervised Clustering of Honeypot Attacks by Deep
HTTP Packet Inspection.- Security Analysis.- Practices for Assessing the
Security Level of Solidity Smart Contracts.- Effectiveness of Binary-Level
CFI Techniques.- A Small WorldPrivacy Preserving IoT Device-type
Fingerprinting with Small Datasets.- URSID: Automatically Refining a Single
Attack Scenario into Multiple Cyber.- Phishing and Social Network.- Does the
Anchoring Effect Influence Individuals' Anti-Phishing
Behavior?.- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious
Tweets.- Web Scams Detection System.- Vulnerabilities and Exploits.- VulMAE:
Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary
Codes.- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives.- A
BERT-Based Framework for Automated Extraction of Indicators of Compromise
from Security  Incident Reports.- Enhancing Code Security Through Open-source
Large Language Models: A Comparative Study.- Network and System
Threat.- Green-Fuzz: Efficient Fuzzing for Network Protocol
Implementations.- Unmasking of Maskware: Detection and Prevention of
Next-Generation Mobile Crypto-Ransomware.- Automated Attacker Behaviour
Classification Using Threat Intelligence Insights.- UDP state manipulation:
description of a Packet Filtering vulnerability in Stateful
firewalls.- Malware Analysis.- Following the Obfuscation Trail: Identifying
and Exploiting Obfuscation Signatures in Malicious Code.- On Exploiting
Symbolic Execution to Improve the Analysis of RAT Samples with
angr.- Original Entry Pointdetection based on graph similarity.- Attacking
and Securing the Clock Randomization and Duplication Side-Channel Attack
Countermeasure.- Security Design.- Hardening Systems Against Data Corruption
Attacks at Design Time.- Design of an Efficient Distributed Delivery Service
for Group Key Agreement Protocols.- A shared key recovery attack on a masked
implementation of CRYSTALS-Kyber's encapsulation algorithm.- Tight
Differential Privacy Guarantees for the Shuffle Model with k-Randomized
Response.