Foundations and practice of security...
FPS (Symposium) (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Foundations and practice of security = 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024 : revised selected papers.. Part I /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Foundations and practice of security/ edited by Kamel Adi ... [et al.].
    其他題名: 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024 : revised selected papers.
    其他題名: FPS 2024
    其他作者: Adi, Kamel.
    團體作者: FPS (Symposium)
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xvi, 416 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System's Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-87499-4
    ISBN: 9783031874994
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入