Availability, reliability and securi...
International Conference on Availability, Security, and Reliability (2025 : )

FindBook      Google Book      Amazon      博客來     
  • Availability, reliability and security = 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Availability, reliability and security/ edited by Mila Dalla Preda ... [et al.].
    其他題名: 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025 : proceedings.
    其他題名: ARES 2025
    其他作者: Dalla Preda, Mila.
    團體作者: International Conference on Availability, Security, and Reliability
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xxi, 433 p. :ill. (some col.), digital ;24 cm.
    內容註: Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter - Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-032-00627-1
    ISBN: 9783032006271
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入