Atjaunināt sīkdatņu piekrišanu

ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 1416, 2023, Revised Selected Papers [Mīkstie vāki]

  • Formāts: Paperback / softback, 378 pages, height x width: 235x155 mm, 79 Illustrations, color; 21 Illustrations, black and white; XIII, 378 p. 100 illus., 79 illus. in color., 1 Paperback / softback
  • Sērija : IFIP Advances in Information and Communication Technology 679
  • Izdošanas datums: 25-Apr-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 303156328X
  • ISBN-13: 9783031563287
  • Mīkstie vāki
  • Cena: 109,38 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 128,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 378 pages, height x width: 235x155 mm, 79 Illustrations, color; 21 Illustrations, black and white; XIII, 378 p. 100 illus., 79 illus. in color., 1 Paperback / softback
  • Sērija : IFIP Advances in Information and Communication Technology 679
  • Izdošanas datums: 25-Apr-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 303156328X
  • ISBN-13: 9783031563287
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2023, held in Poznan, Poland, in June 2023. 





The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc. 
Web Content Integrity Tamper-proof websites beyond
HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data
Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk
Assessment During System Design.- The Influence of Privacy Concerns on
Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via
Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication
Metadata.- Practical Single-Round Secure Wildcard Pattern
Matching.- Efficient non-interactive anonymous communication.- PointPuff An
Ed25519 Optimization Implementation.- Detecting web tracking at the network
layer.- Whats inside a node? Malicious IPFS nodes under the magnifying
glass.- Quantum-secure Communication for Trusted Edge Computing with
IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence
Exercises.- Automated and Improved Detection of Cyber Attacks via an
Industrial IDS Probe.- An Accurate and Real-time Detection Method for
Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy
Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards
Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing
802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to
Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based
MAlicious Domain Detection through Optimized Neural Network with Feature
Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank
Centrality.- Machine Learning Metrics for Network Datasets
Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between
Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform
Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward
the Establishment of Evaluating URL Embedding Methods using Intrinsic
Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of
Multiple Authenticators in Public Key Authentication.