Fr. 239.00

ICT Systems Security and Privacy Protection - 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part I

English · Hardback

Shipping usually within 6 to 7 weeks

Description

Read more

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 
The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

List of contents

.- Privacy protection.
.- Advanced strategies for privacy preserving data publishing to improve multi class classification.
.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers.
.- SAAFL: Secure Aggregation for Label Aware Federated Learning.
.- We ve met some problems : Developers Issues With Privacy Preserving Computation Techniques on Stack Overflow.
.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.
.- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform.
.- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration.
.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.
.- Industrial and Critical Infrastructure Security.
.- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic.
.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems.
.- Certified Secure Updates for IoT Devices.
.- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing.
.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems.
.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.
.- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation.
.- SAVA Deployment for Spoofed Source Attacks.
.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.