| 紀錄類型: |
書目-電子資源
: Monograph/item
|
| 正題名/作者: |
Secure IT systems/ edited by Leonardo Horn Iwaya ... [et al.]. |
| 其他題名: |
29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6-7, 2024 proceedings / |
| 其他題名: |
NordSec 2024 |
| 其他作者: |
Horn Iwaya, Leonardo. |
| 團體作者: |
Nordic Conference on Secure IT Systems |
| 出版者: |
Cham :Springer Nature Switzerland : : 2025., |
| 面頁冊數: |
xiii, 502 p. :ill. (chiefly color), digital ;24 cm. |
| 內容註: |
Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services. |
| Contained By: |
Springer Nature eBook |
| 標題: |
Computer security - Congresses. - |
| 電子資源: |
https://doi.org/10.1007/978-3-031-79007-2 |
| ISBN: |
9783031790072 |