語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data and applications security and p...
~
Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2025 :)
FindBook
Google Book
Amazon
博客來
Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data and applications security and privacy XXXIX/ edited by Sokratis Katsikas, Basit Shafiq.
其他題名:
39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
其他題名:
Data and applications security and privacy 39
其他作者:
Katsikas, Sokratis.
團體作者:
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xiii, 458 p. :ill., digital ;24 cm.
內容註:
AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-96590-6
ISBN:
9783031965906
Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
Data and applications security and privacy XXXIX
39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /[electronic resource] :Data and applications security and privacy 39edited by Sokratis Katsikas, Basit Shafiq. - Cham :Springer Nature Switzerland :2025. - xiii, 458 p. :ill., digital ;24 cm. - Lecture notes in computer science,157221611-3349 ;. - Lecture notes in computer science ;15722..
AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gjøvik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.
ISBN: 9783031965906
Standard No.: 10.1007/978-3-031-96590-6doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
LDR
:04193nmm a2200397 a 4500
001
2413349
003
DE-He213
005
20250623130235.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031965906
$q
(electronic bk.)
020
$a
9783031965890
$q
(paper)
024
7
$a
10.1007/978-3-031-96590-6
$2
doi
035
$a
978-3-031-96590-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A615 2025
111
2
$a
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
$n
(39th :
$d
2025 :
$c
Gjøvik, Norway)
$3
3789358
245
1 0
$a
Data and applications security and privacy XXXIX
$h
[electronic resource] :
$b
39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
$c
edited by Sokratis Katsikas, Basit Shafiq.
246
3
$a
Data and applications security and privacy 39
246
3
$a
DBSec 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 458 p. :
$b
ill., digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15722
505
0
$a
AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
520
$a
This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gjøvik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
0
$a
Database security
$v
Congresses.
$3
738112
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Database Management System.
$3
3591759
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Katsikas, Sokratis.
$3
893229
700
1
$a
Shafiq, Basit.
$3
1923469
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15722.
$3
3789359
856
4 0
$u
https://doi.org/10.1007/978-3-031-96590-6
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9518804
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入