| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Risks and security of internet and systems/ edited by Simon Collart-Dutilleul ... [et al.]. |
| Reminder of title: |
19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024 : proceedings / |
| remainder title: |
CRiSIS 2024 |
| other author: |
Collart-Dutilleul, Simon. |
| corporate name: |
CRiSIS (Conference) |
| Published: |
Cham :Springer Nature Switzerland : : 2025., |
| Description: |
xx, 560 p. :ill. (some col.), digital ;24 cm. |
| [NT 15003449]: |
Abstracts of Invited Talks. -- Horizontal Attack from Theory to Practice. -- Security for Safety Critical Systems in the Railways. -- Security Network Protocols. -- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks. -- Card-Based Secure Evaluation of Decision Trees. -- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach. -- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions. -- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy. -- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0. -- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects. -- AI-Driven Threat Detection. -- On the Properness of Large Language Models for Malware Detection. -- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing. -- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence. -- Automated Risk Assessment of Shell-Based Attacks Using a LLM. -- Information Security Management. -- ECU-KM : An Efficient Key Management for In-Vehicle Networks. -- Injecting Bias into Text Classification Models Using Backdoor Attacks. -- Towards New Models of Information Sharing. -- Distributed and Verifiable Digital Badges. -- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design. -- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach. -- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities. -- Applied Cryptography & Privacy. -- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning. -- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT. -- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map. -- Threats Detection & Protection. -- Preventing WebRTC IP Address Leaks. -- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. -- Device Fingerprinting Remediation in Android and iOS Apps. -- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements. -- Risk Identification & Management. -- A Safety Kernel for Flexible Level Crossing Management. -- Efficient Identification of UAVs Through Automatic Communication Frame Linking. -- Enterprise Risk Management in SMEs : Insights from West Africa. -- Blockchain & Distributed Ledger Security. -- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers. -- Modeling and Assessing Coercion Threats in Electronic Voting. -- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme. -- AI for Security Assessment. -- Automated Assessment of the Exploits Using Deep Learning Methods. -- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-Off. -- Relevance of Image-Based Representation for Android Malware Detection. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Internet - Congresses. - Security measures - |
| Online resource: |
https://doi.org/10.1007/978-3-031-89350-6 |
| ISBN: |
9783031893506 |