語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security applications = ...
~
WISA (Workshop : Information security) (2024 :)
FindBook
Google Book
Amazon
博客來
Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security applications/ edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee.
其他題名:
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
其他題名:
WISA 2024
其他作者:
Lee, Jong-Hyouk.
團體作者:
WISA (Workshop : Information security)
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxii, 378 p. :ill. (some col.), digital ;24 cm.
內容註:
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-1624-4
ISBN:
9789819616244
Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
Information security applications
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /[electronic resource] :WISA 2024edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee. - Singapore :Springer Nature Singapore :2025. - xxii, 378 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,154990302-9743 ;. - Lecture notes in computer science ;15499..
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024. The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
ISBN: 9789819616244
Standard No.: 10.1007/978-981-96-1624-4doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
LDR
:04314nmm a2200373 a 4500
001
2408693
003
DE-He213
005
20250204115223.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819616244
$q
(electronic bk.)
020
$a
9789819616237
$q
(paper)
024
7
$a
10.1007/978-981-96-1624-4
$2
doi
035
$a
978-981-96-1624-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W811 2024
111
2
$a
WISA (Workshop : Information security)
$n
(25th :
$d
2024 :
$c
Cheju Island, Korea)
$3
3781389
245
1 0
$a
Information security applications
$h
[electronic resource] :
$b
25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
$c
edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee.
246
3
$a
WISA 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxii, 378 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
15499
505
0
$a
Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
520
$a
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024. The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Lee, Jong-Hyouk.
$3
3251594
700
1
$a
Emura, Keita.
$3
3781390
700
1
$a
Lee, Sokjoon.
$3
3781391
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15499.
$3
3781392
856
4 0
$u
https://doi.org/10.1007/978-981-96-1624-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9514191
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入
(1)帳號:一般為「身分證號」;外籍生或交換生則為「學號」。 (2)密碼:預設為帳號末四碼。
帳號
.
密碼
.
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)