Atjaunināt sīkdatņu piekrišanu

ICT Systems Security and Privacy Protection: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 2123, 2025, Proceedings, Part I [Hardback]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Hardback, 254 pages, height x width: 235x155 mm, 60 Illustrations, color; 17 Illustrations, black and white; XIV, 254 p. 77 illus., 60 illus. in color., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 745
  • Izdošanas datums: 16-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031928814
  • ISBN-13: 9783031928819
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 180,78 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 212,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 254 pages, height x width: 235x155 mm, 60 Illustrations, color; 17 Illustrations, black and white; XIV, 254 p. 77 illus., 60 illus. in color., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 745
  • Izdošanas datums: 16-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031928814
  • ISBN-13: 9783031928819
Citas grāmatas par šo tēmu:
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 



The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).
.- Privacy protection.


.- Advanced strategies for privacy preserving data publishing to improve
multi class classification.


.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for
Transformers.


.- SAAFL: Secure Aggregation for Label Aware Federated Learning.


.- Weve met some problems: Developers Issues With Privacy Preserving
Computation Techniques on Stack Overflow.


.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.


.- Post Processing in Local Differential Privacy: An Extensive Evaluation and
Benchmark Platform.


.- Rubber Ducky Station: Advancing HID Attacks with Visual
Data Exfiltration.


.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.


.- Industrial and Critical Infrastructure Security.


.- Uncovering Robot Joint Level Controller Actions from Encrypted Network
Traffic.


.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control
Systems.


.- Certified Secure Updates for IoT Devices.


.- LSAST: Enhancing Cybersecurity through LLM supported Static Application
Security Testing.


.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control
Systems.


.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.


.- SAFARI: a Scalable Air gapped Framework for Automated
Ransomware Investigation.


.- SAVA Deployment for Spoofed Source Attacks.


.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous
Chain of Trust in Software Integrity Measurements.