Atjaunināt sīkdatņu piekrišanu

E-grāmata: Secure IT Systems: 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 15396
  • Izdošanas datums: 28-Jan-2025
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031790072
  • Formāts - EPUB+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 15396
  • Izdošanas datums: 28-Jan-2025
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031790072

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 67, 2024.





The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.
.- Authentication.



.- Are Swedish Passwords Tougher Than the Rest?.



.- Towards Exploring Cross-Regional and Cross-Platform Differences in Login
Throttling.



.- Cryptography.



.- Determining the A5 encryption algorithms used in 2G (GSM) networks.



.- Misbinding Raw Public Keys to Identities in TLS.



.- Small Private Exponent Attacks on Takagi Family Schemes.



.- Cyber-Physical Systems.



.- A Comparison of Deep Learning Approaches for Power-based Side-channel
Attacks.



.- Binary-Level Code Injection for Automated Tool Support on the ESP32
Platform.



.- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine
Learning: An Empirical Study.



.- Cybersecurity and Policy.



.- A Gamified Learning Approach for IoT Security Education using
Capture-the-Flag Competitions: Architecture and Insights.



.- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical
Infrastructure.



.- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare.



.- LLMs for Security.



.- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco
Certificates.



.- How to Train Your Llama Efficient Grammar-Based Application Fuzzing
Using Large Language Models.



.- The Dual-Edged Sword of Large Language Models in Phishing.



.- Formal Verification.



.- Analysing TLS Implementations using Full-Message Symbolic Execution.



.- Formal Verification of Browser Fingerprinting and Mitigation with Inlined
Reference Monitors.



.- Mobile & IoT.



.- Beware of the Rabbit Hole A Digital Forensic Case Study of DIY Drones.



.- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a
Smart Speaker.



.- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study.



.- Network Security.



.- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.



.- Fingerprinting DNS Resolvers using Query Patterns from QNAME
Minimization.



.- Formally Discovering and Reproducing Network Protocols Vulnerabilities.



.- Privacy.



.- Enhancing Noise Estimation for Statistical Disclosure Attacks using the
Artificial Bee Colony Algorithm.



.- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites
Promoting Selected Privacy-Enhancing Technologies.



.- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion
Services.