Muutke küpsiste eelistusi

ICT Systems Security and Privacy Protection: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 2123, 2025, Proceedings, Part II [Kõva köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Hardback, 280 pages, kõrgus x laius: 235x155 mm, 33 Illustrations, color; 13 Illustrations, black and white; XIV, 280 p. 46 illus., 33 illus. in color., 1 Hardback
  • Sari: IFIP Advances in Information and Communication Technology 746
  • Ilmumisaeg: 16-May-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031928857
  • ISBN-13: 9783031928857
Teised raamatud teemal:
  • Kõva köide
  • Hind: 104,29 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 122,69 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 280 pages, kõrgus x laius: 235x155 mm, 33 Illustrations, color; 13 Illustrations, black and white; XIV, 280 p. 46 illus., 33 illus. in color., 1 Hardback
  • Sari: IFIP Advances in Information and Communication Technology 746
  • Ilmumisaeg: 16-May-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031928857
  • ISBN-13: 9783031928857
Teised raamatud teemal:
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 



The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).
.- Applied Cryptography.


.- CoolTest: Improved Randomness Testing Using Boolean Functions.


.- Towards a lightweight and privacy friendly Architecture for
Online Advertising.


.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data
Recovery Considering Post Quantum Threats.


.- Checking the Impact of Security Standardization A Case Study on Bluetooth
LE Pairing of Internet of Things Devices.


.- Data and Application Security.


.- Generating and Attacking Passwords with Misspellings by
Leveraging Homophones.


.- Time is money: A temporal model of cybersecurity.


.- Update at Your Own Risk: Analysis and Recommendations for Update related
Vulnerabilities.


.- You still have to study On the Security of LLM generated code.


.- Certifiably robust malware detectors by design.


.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial
Attacks in the Real World.


.- Identifying and Analyzing Vulnerabilities and Exploits in On
Premises Kubernetes.


.- International Workshop on Network and Distributed Systems Security (WNDSS
2025).


.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.


.- Impact Analysis of Sybil Attacks in the Tor Network.


.- Security Metrics for False Data Injection in Smart Grids.


.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.


.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity
Attack.


.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.


.- Time Aware Face Anti Spoofing with Rotation Invariant Local
Binary Patterns and Deep Learning.