Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security Applications: 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 15499
  • Izdošanas datums: 04-Feb-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9789819616244
  • Formāts - EPUB+DRM
  • Cena: 71,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 15499
  • Izdošanas datums: 04-Feb-2025
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9789819616244

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 2123, 2024.





The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
.- Cryptography.

.- ECPM Cryptanalysis Resource Estimation.

.- Integral Attack with Bit-based Division Property on the Lightweight Block
Cipher LBC.

.- Network Security.

.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp
Approach.

.- Investigating the Transferability of Evasion Attacks in Network Intrusion
Detection Systems Considering Domain-Specific Constraints.

.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial
Training.

.- AI Security
1.

.- VoteGAN: Generalized Membership Inference Attack Against Generative Models
by Multiple Discriminators.

.- Unsupervised Contextual Anomalous Communication Detection Using VQ
Tokeniza tion with Flow Data.

.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with
Random Masking.

.- Network & Application Security.

.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in
Network Slicing.

.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An
Emperi cal Analysis.

.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust
Architecture.

.- AI Security
2.

.- ChatDEOB: An Effective Deobfuscation Method based on Large Language
Model.

.- An effective ensemble algorithm for short-term load forecasting.

.- CPS Security.

.- PUF-Based Authentication and Authorization Protocol for IoT.

.- Field Testing and Detection of Camera Interference for Autonomous Driving

.- One-class Classification-based Position Falsification Detection System in
C-ITS Communication Network.

.- Fuzzing.

.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.

.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information
leakage attack in air-gapped networks.

.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.

.- Malware.

.- Detecting Phishing-targeted Web Push Notifications through Image
Similarity Analysis.

.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A
Measurement Perspective.

.- A Survey on Attack Cases with VBS Malware in Windows.

.- Software Security.

.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic
Seg mentation Models with Patch Attack.

.- Plotting OSS-based Supply Chain attack strategies and the defense
failure.

.- A Proposal of a Supply Chain Security Model for Generative AI.

.- Emerging Topic.

.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification
in a Microgrid.

.- Quantum Implementation of LSH.

.- Who ruins the game?: unveiling cheating users in the Battlefield" game.