語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data and applications security and p...
~
Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2024 :)
FindBook
Google Book
Amazon
博客來
Data and applications security and privacy XXXVIII = 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data and applications security and privacy XXXVIII/ edited by Anna Lisa Ferrara, Ram Krishnan.
其他題名:
38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
其他題名:
Data and applications security and privacy 38
其他作者:
Ferrara, Anna Lisa.
團體作者:
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xv, 342 p. :ill. (some col.), digital ;24 cm.
內容註:
Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-65172-4
ISBN:
9783031651724
Data and applications security and privacy XXXVIII = 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
Data and applications security and privacy XXXVIII
38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /[electronic resource] :Data and applications security and privacy 38edited by Anna Lisa Ferrara, Ram Krishnan. - Cham :Springer Nature Switzerland :2024. - xv, 342 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,149011611-3349 ;. - Lecture notes in computer science ;14901..
Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
ISBN: 9783031651724
Standard No.: 10.1007/978-3-031-65172-4doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A56 2024
Dewey Class. No.: 005.8
Data and applications security and privacy XXXVIII = 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
LDR
:03594nmm a2200385 a 4500
001
2373913
003
DE-He213
005
20240713130851.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031651724
$q
(electronic bk.)
020
$a
9783031651717
$q
(paper)
024
7
$a
10.1007/978-3-031-65172-4
$2
doi
035
$a
978-3-031-65172-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A56 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A615 2024
111
2
$a
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
$n
(38th :
$d
2024 :
$c
San Jose, Calif.)
$3
3722374
245
1 0
$a
Data and applications security and privacy XXXVIII
$h
[electronic resource] :
$b
38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
$c
edited by Anna Lisa Ferrara, Ram Krishnan.
246
3
$a
Data and applications security and privacy 38
246
3
$a
DBSec 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xv, 342 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
14901
505
0
$a
Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
520
$a
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
0
$a
Database security
$v
Congresses.
$3
738112
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Database Management System.
$3
3591759
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Ferrara, Anna Lisa.
$3
3662980
700
1
$a
Krishnan, Ram.
$3
3594587
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14901.
$3
3722375
856
4 0
$u
https://doi.org/10.1007/978-3-031-65172-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9494362
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A56 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入