Information security applications = ...
WISA (Workshop : Information security) (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Information security applications = 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security applications/ edited by Jong-Hyouk Lee, Keita Emura, Sokjoon Lee.
    其他題名: 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024 : revised selected papers /
    其他題名: WISA 2024
    其他作者: Lee, Jong-Hyouk.
    團體作者: WISA (Workshop : Information security)
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xxii, 378 p. :ill. (some col.), digital ;24 cm.
    內容註: Cryptography. -- ECPM Cryptanalysis Resource Estimation. -- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC. -- Network Security. -- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach. -- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints. -- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training. -- AI Security 1. -- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators. -- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data. -- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking. -- Network & Application Security. -- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing. -- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis. -- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture. -- AI Security 2. -- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model. -- An effective ensemble algorithm for short-term load forecasting. -- CPS Security. -- PUF-Based Authentication and Authorization Protocol for IoT. -- Field Testing and Detection of Camera Interference for Autonomous Driving -- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network. -- Fuzzing. -- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection. -- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks. -- Fuzzing JavaScript Engines with Diversified Mutation Strategies. -- Malware. -- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis. -- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective. -- A Survey on Attack Cases with VBS Malware in Windows. -- Software Security. -- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack. -- Plotting OSS-based Supply Chain attack strategies and the defense failure. -- A Proposal of a Supply Chain Security Model for Generative AI. -- Emerging Topic. -- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid. -- Quantum Implementation of LSH. -- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-1624-4
    ISBN: 9789819616244
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入