ICT systems security and privacy pro...
IFIP TC11 International Information Security Conference (2025 :)

FindBook      Google Book      Amazon      博客來     
  • ICT systems security and privacy protection = 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: ICT systems security and privacy protection/ edited by Lili Nemec Zlatolas ... [et al.].
    其他題名: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.
    其他題名: SEC 2025
    其他作者: Nemec Zlatolas, Lili.
    團體作者: IFIP TC11 International Information Security Conference
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xiv, 280 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- "You still have to study" On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-92886-4
    ISBN: 9783031928864
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入