Fr. 91.00

Availability, Reliability and Security - ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part IV

English · Paperback / Softback

Will be released 03.09.2025

Description

Read more

List of contents

First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025): Securing the Road Ahead: Supporting Decision Making in Automotive Cybersecurity Risk Treatment.- A Data-Driven Approach for Cyber Security Assessments of SMEs.- A Viewpoint-based Model of Data Protection Impact Assessments.- Cybersecurity Vulnerability Prioritisation via Risk Assessment. Second International Workshop on Emerging Digital Identities (EDId 2025): Attestation of Electronic Identification Schemes based on Secure Channels through Security Microcontrollers.- A High-Level-of-Assurance EUDI Wallet with a Remote WSCD Supporting Biometrics and Passkeys.- Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers.- Identity and Access Management for Dataspaces using the European Business Wallet and eIDAS-based Credentials.- Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2.- Authentication Inconsistencies Across Online Services: A Multi-Scenario Security Analysis. Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025): A Review of Deep Packet Inspection for Network Security: From Traditional Techniques to Machine Learning Integration.- Building Realistic Ground Truth Datasets of Personal Identification Information for Entity Matching.- A Quantum-Safe Hybrid Cryptographic Framework for Multimedia Application. 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025): Privacy-Preserving Knowledge Graph Sharing in Peer-to-Peer Decentralized Federated Learning for Connected Autonomous Vehicles.- Leveraging Graph Neural Networks for Attack Detection in IoT Systems.- Hyperparameter Optimization in Neuro-Symbolic Unsupervised Graph Learning. 5th International Workshop on Behavioral Authentication for System Security (BASS 2025): Behavior-Based Anomaly Detection in Access and Usage Control for Smart Home Environments.- Unmasking Model Behavior: How LLMs reason on Vulnerability Detection.- Leveraging Knowledge Graphs and LLMs for Structured Generation of Misinformation.

Summary

This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. 
The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions.
They contain papers of the following workshops:
Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025).
Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025).
Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025).
Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).

Product details

Assisted by Bart Coppens (Editor), Bjorn De Sutter (Editor), Vincent Naessens (Editor), Vincent Naessens et al (Editor), Bruno Volckaert (Editor)
Publisher Springer International Publishing
 
Languages English
Product format Paperback / Softback
Release 03.09.2025
 
EAN 9783032006387
ISBN 978-3-032-00638-7
No. of pages 339
Illustrations XX, 339 p. 85 illus., schwarz-weiss Illustrationen
Series Lecture Notes in Computer Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Netzwerksicherheit, Security, Privacy, Malware, Data and Information Security, Network Security, Forensics, availability, security awareness, dependability, Communication security, IoT security, privacy-enhancing technologies, embedded systems security

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.