ICT systems security and privacy pro...
IFIP TC11 International Information Security Conference (2025 :)

FindBook      Google Book      Amazon      博客來     
  • ICT systems security and privacy protection = 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: ICT systems security and privacy protection/ edited by Lili Nemec Zlatolas ... [et al.].
    其他題名: 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025 : proceedings.
    其他題名: SEC 2025
    其他作者: Nemec Zlatolas, Lili.
    團體作者: IFIP TC11 International Information Security Conference
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xiv, 254 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Privacy protection. -- Advanced strategies for privacy preserving data publishing to improve multi class classification. -- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers. -- SAAFL: Secure Aggregation for Label Aware Federated Learning. -- "We've met some problems": Developers' Issues With Privacy Preserving Computation Techniques on Stack Overflow. -- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis. -- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform. -- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration. -- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage. -- Industrial and Critical Infrastructure Security. -- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic. -- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems. -- Certified Secure Updates for IoT Devices. -- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing. -- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems. -- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects. -- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation. -- SAVA Deployment for Spoofed Source Attacks. -- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-92882-6
    ISBN: 9783031928826
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入