Fr. 147.00

ICT Systems Security and Privacy Protection - 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part II

English · Hardback

Shipping usually within 6 to 7 weeks

Description

Read more

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 
The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

List of contents

.- Applied Cryptography.
.- CoolTest: Improved Randomness Testing Using Boolean Functions.
.- Towards a lightweight and privacy friendly Architecture for Online Advertising.
.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats.
.- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices.
.- Data and Application Security.
.- Generating and Attacking Passwords with Misspellings by Leveraging Homophones.
.- Time is money: A temporal model of cybersecurity.
.- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities.
.- You still have to study On the Security of LLM generated code.
.- Certifiably robust malware detectors by design.
.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World.
.- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes.
.- International Workshop on Network and Distributed Systems Security (WNDSS 2025).
.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.
.- Impact Analysis of Sybil Attacks in the Tor Network.
.- Security Metrics for False Data Injection in Smart Grids.
.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.
.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack.
.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.
.- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.