| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
ICT systems security and privacy protection/ edited by Lili Nemec Zlatolas ... [et al.]. |
| Reminder of title: |
40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings. |
| remainder title: |
SEC 2025 |
| other author: |
Nemec Zlatolas, Lili. |
| corporate name: |
IFIP TC11 International Information Security Conference |
| Published: |
Cham :Springer Nature Switzerland : : 2025., |
| Description: |
xiv, 280 p. :ill. (chiefly color), digital ;24 cm. |
| [NT 15003449]: |
Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- "You still have to study" On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-3-031-92886-4 |
| ISBN: |
9783031928864 |