Atjaunināt sīkdatņu piekrišanu

Foundations and Practice of Security: 16th International Symposium, FPS 2023, Bordeaux, France, December 1113, 2023, Revised Selected Papers, Part II 2024 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 106 pages, height x width: 235x155 mm, 19 Illustrations, color; 14 Illustrations, black and white; XIX, 106 p. 33 illus., 19 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14552
  • Izdošanas datums: 25-Apr-2024
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031575393
  • ISBN-13: 9783031575396
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 51,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 60,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 106 pages, height x width: 235x155 mm, 19 Illustrations, color; 14 Illustrations, black and white; XIX, 106 p. 33 illus., 19 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14552
  • Izdošanas datums: 25-Apr-2024
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031575393
  • ISBN-13: 9783031575396
Citas grāmatas par šo tēmu:

This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11–13, 2023.

The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections:


Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.

Part II : security design, short papers. 

 

Short Papers.- UCAT: the Uniform Categorization for Access
Control.- Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing
Approach.- Comparative Analysis of Reduction Methods on Provenance Graphs for
APT Attack Detection.- Evaluating Deep Learning for Cross-Domains Fake News
Detection.- Accurify: Automated New Testflows Generation for Attack Variants
in Threat Hunting.- Trade-off between Authentication Performance and
Detection Time for Zero-effort Attack in Location-based
Authentication.- SADIS: real-time sound-based anomaly detection for
industrial systems.- A resilience Component for a Digital Twin.