Atjaunināt sīkdatņu piekrišanu

Foundations and Practice of Security: 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 911, 2024, Revised Selected Papers, Part I [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 416 pages, height x width: 235x155 mm, 79 Illustrations, color; 34 Illustrations, black and white; XVI, 416 p. 113 illus., 79 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15532
  • Izdošanas datums: 01-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031874986
  • ISBN-13: 9783031874987
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 136,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 160,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 416 pages, height x width: 235x155 mm, 79 Illustrations, color; 34 Illustrations, black and white; XVI, 416 p. 113 illus., 79 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15532
  • Izdošanas datums: 01-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031874986
  • ISBN-13: 9783031874987
Citas grāmatas par šo tēmu:
This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 0911, 2024.



The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections:





Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure; New trends in advanced cryptographic protocols.   Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.
.- Critical issues of protecting systems against digital threats,
considering financial, technological, and operational implications.
.- The Perfect Victim? Family Offices as Targets for Cybercriminals.
.- Advanced Real-Time Detection of Cyber Threat Information from Tweets.
.- Mitigating spillover effects of ransomware in financial markets: Lessons
from the LockBit attacks.
.- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy
Adoption Calculus Perspective.
.- ICoSSiuM: an Integrated Communication Security Simulator for Maritime
operations.
.- Automating and enhancing security mechanisms in software systems and data
management.
.- Lowering the Barrier: An Automatic Attack Flow Generation Framework for
Non-Security Experts.
.- An Approach to Determine a Systems Behavioural Security Posture.
.- Secure Data Traceability for Mobile DataCollectors.
.- Toward Automatic Enforcement of Security Patterns in Software Architecture
Using Alloy.
.- Cybersecurity and AI when applied to emerging technologies.
.- Light-SABRE: A lightweight encrypted data distribution system for Internet
of Things.
.- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A
Comparative Analysis.
.- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning.
.- A Tool for Enabling Scalable Automation in Security Control Selection.
.- Cybersecurity and Ethics.
.- A Systematic Evaluation of Non-SDK Interface Restrictions in Android:
Bridging the Gap Between Guidelines and Practice.
.- An Approach for Handling Missing Attribute Values in Attribute-Based
Access Control Policy Mining.
.- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News
Detection.
.- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for
Multi-Domain Fake News Detection.
.- Parametric Automata for Dynamic Access Control Policies.
.- Cybersecurity and privacy in connected and autonomous systems for IoT,
smart environments, and critical infrastructure.
.- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses.
.- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps.
.- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps
Substation Automation Security.
.- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native
Environments.
.- Detecting Cyber Attacks on Electric Vehicles Charging Stations.
.- New trends in advanced cryptographic protocols.
.- Secure Voting Protocol Using Balance Scale.
.- Monitoring the execution of cryptographic functions.
.- RouterORAM: An O(1)-latency and client-work ORAM.