| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
ICT systems security and privacy protection/ edited by Norbert Meyer, Anna Grocholewska-Czuryło. |
| Reminder of title: |
38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023 : revised selected papers / |
| remainder title: |
SEC 2023 |
| other author: |
Meyer, Norbert. |
| corporate name: |
IFIP TC11 International Information Security Conference |
| Published: |
Cham :Springer Nature Switzerland : : 2024., |
| Description: |
xiii, 378 p. :ill. (some col.), digital ;24 cm. |
| [NT 15003449]: |
Web Content Integrity Tamper-proof websites beyond HTTPS -- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP -- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design -- The Influence of Privacy Concerns on Cryptocurrency Acceptance -- Automated Enrichment of Logical Attack Graphs via Formal Ontologies -- Detecting Web Bots via Mouse Dynamics and Communication Metadata -- Practical Single-Round Secure Wildcard Pattern Matching -- Efficient non-interactive anonymous communication -- PointPuff An Ed25519 Optimization Implementation -- Detecting web tracking at the network layer -- What's inside a node? Malicious IPFS nodes under the magnifying glass -- Quantum-secure Communication for Trusted Edge Computing with IoT Devices -- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises -- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe -- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network -- Towards An Information Privacy Competency Model for the Usage of Mobile Applications -- SecPassInput: Towards Secure Memory and Password Handling in Web Applications -- Bl0ck Paralyzing 802.11 connections through Block Ack frames -- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates -- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis -- Cyber Key Terrain Identification Using Adjusted PageRank Centrality -- Machine Learning Metrics for Network Datasets Evaluation -- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools -- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack -- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection -- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-3-031-56326-3 |
| ISBN: |
9783031563263 |