Atjaunināt sīkdatņu piekrišanu

ICT Systems Security and Privacy Protection: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 2123, 2025, Proceedings, Part II [Hardback]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Hardback, 280 pages, height x width: 235x155 mm, 33 Illustrations, color; 13 Illustrations, black and white; XIV, 280 p. 46 illus., 33 illus. in color., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 746
  • Izdošanas datums: 16-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031928857
  • ISBN-13: 9783031928857
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 100,46 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 118,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 280 pages, height x width: 235x155 mm, 33 Illustrations, color; 13 Illustrations, black and white; XIV, 280 p. 46 illus., 33 illus. in color., 1 Hardback
  • Sērija : IFIP Advances in Information and Communication Technology 746
  • Izdošanas datums: 16-May-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031928857
  • ISBN-13: 9783031928857
Citas grāmatas par šo tēmu:
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 



The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).
.- Applied Cryptography.


.- CoolTest: Improved Randomness Testing Using Boolean Functions.


.- Towards a lightweight and privacy friendly Architecture for
Online Advertising.


.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data
Recovery Considering Post Quantum Threats.


.- Checking the Impact of Security Standardization A Case Study on Bluetooth
LE Pairing of Internet of Things Devices.


.- Data and Application Security.


.- Generating and Attacking Passwords with Misspellings by
Leveraging Homophones.


.- Time is money: A temporal model of cybersecurity.


.- Update at Your Own Risk: Analysis and Recommendations for Update related
Vulnerabilities.


.- You still have to study On the Security of LLM generated code.


.- Certifiably robust malware detectors by design.


.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial
Attacks in the Real World.


.- Identifying and Analyzing Vulnerabilities and Exploits in On
Premises Kubernetes.


.- International Workshop on Network and Distributed Systems Security (WNDSS
2025).


.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.


.- Impact Analysis of Sybil Attacks in the Tor Network.


.- Security Metrics for False Data Injection in Smart Grids.


.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.


.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity
Attack.


.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.


.- Time Aware Face Anti Spoofing with Rotation Invariant Local
Binary Patterns and Deep Learning.