Fr. 238.00

ICT Systems Security and Privacy Protection - 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part I

Inglese · Copertina rigida

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 
The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

Sommario

.- Privacy protection.
.- Advanced strategies for privacy preserving data publishing to improve multi class classification.
.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers.
.- SAAFL: Secure Aggregation for Label Aware Federated Learning.
.- We ve met some problems : Developers Issues With Privacy Preserving Computation Techniques on Stack Overflow.
.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.
.- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform.
.- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration.
.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.
.- Industrial and Critical Infrastructure Security.
.- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic.
.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems.
.- Certified Secure Updates for IoT Devices.
.- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing.
.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems.
.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.
.- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation.
.- SAVA Deployment for Spoofed Source Attacks.
.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.