Muutke küpsiste eelistusi

ICT Systems Security and Privacy Protection: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 2123, 2025, Proceedings, Part I [Kõva köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Hardback, 254 pages, kõrgus x laius: 235x155 mm, 60 Illustrations, color; 17 Illustrations, black and white; XIV, 254 p. 77 illus., 60 illus. in color., 1 Hardback
  • Sari: IFIP Advances in Information and Communication Technology 745
  • Ilmumisaeg: 16-May-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031928814
  • ISBN-13: 9783031928819
Teised raamatud teemal:
  • Kõva köide
  • Hind: 187,67 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 220,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 254 pages, kõrgus x laius: 235x155 mm, 60 Illustrations, color; 17 Illustrations, black and white; XIV, 254 p. 77 illus., 60 illus. in color., 1 Hardback
  • Sari: IFIP Advances in Information and Communication Technology 745
  • Ilmumisaeg: 16-May-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031928814
  • ISBN-13: 9783031928819
Teised raamatud teemal:
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 



The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).
.- Privacy protection.


.- Advanced strategies for privacy preserving data publishing to improve
multi class classification.


.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for
Transformers.


.- SAAFL: Secure Aggregation for Label Aware Federated Learning.


.- Weve met some problems: Developers Issues With Privacy Preserving
Computation Techniques on Stack Overflow.


.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.


.- Post Processing in Local Differential Privacy: An Extensive Evaluation and
Benchmark Platform.


.- Rubber Ducky Station: Advancing HID Attacks with Visual
Data Exfiltration.


.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.


.- Industrial and Critical Infrastructure Security.


.- Uncovering Robot Joint Level Controller Actions from Encrypted Network
Traffic.


.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control
Systems.


.- Certified Secure Updates for IoT Devices.


.- LSAST: Enhancing Cybersecurity through LLM supported Static Application
Security Testing.


.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control
Systems.


.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.


.- SAFARI: a Scalable Air gapped Framework for Automated
Ransomware Investigation.


.- SAVA Deployment for Spoofed Source Attacks.


.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous
Chain of Trust in Software Integrity Measurements.