| Record Type: |
Electronic resources
: Monograph/item
|
| Title/Author: |
Availability, reliability and security/ edited by Mila Dalla Preda ... [et al.]. |
| Reminder of title: |
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings. |
| remainder title: |
ARES 2025 |
| other author: |
Dalla Preda, Mila. |
| corporate name: |
International Conference on Availability, Security, and Reliability |
| Published: |
Cham :Springer Nature Switzerland : : 2025., |
| Description: |
xxi, 433 p. :ill. (some col.), digital ;24 cm. |
| [NT 15003449]: |
Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter - Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks. |
| Contained By: |
Springer Nature eBook |
| Subject: |
Computer security - Congresses. - |
| Online resource: |
https://doi.org/10.1007/978-3-032-00627-1 |
| ISBN: |
9783032006271 |