• Neu
Alrabaee / Choo / Damiani

Security and Privacy in Communication Networks

20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part III
Erscheinungsjahr 2025
ISBN: 978-3-031-94454-3
Verlag: Springer

20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part III

Buch, Englisch, 482 Seiten, Format (B × H): 155 mm x 235 mm

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-031-94454-3
Verlag: Springer


This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.

The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on

Privacy and Cryptography

AI for cybersecurity and Adversial models

Quantum Computing in Cybersecurity

Network Security

Blockchain and Cryptocurrencies

Fuzzing and IoT security

Malware and Attack Analysis

Web Security

Authentication

Large Language Model for Cybersecurity

Security Assessments

Alrabaee / Choo / Damiani Security and Privacy in Communication Networks jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Fuzzing and IoT security.- Fast Firmware Fuzz with Input/Output Reposition.- ChipFuzzer: Towards Fuzzing Matter based IoT Devices for Vulnerability Detection.- Reusablity Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity.- Multi Server Publicly Verifiable Computation of polynomials.- Siamese Neural Network for Robust IoT Device Type Identification: A Few Shot Learning Approach.- FISFuzzer: A Grey Box Protocol Fuzzer Based on Field Inference and Scheduling.- Malware and Attack Analysis.- Mal POBM: A Genetic Algorithm for Malware Adversarial Sample Generation.- Graphite: Real Time Graph Based Detection of Windows Fileless Malware Attacks.- Robust Network Intrusion Detection via Semi-Supervised Deep Reinforcement Learning.- BinSimDB: Benchmark Dataset Construction for Fine Grained Binary Code Similarity Analysis.- OnionPeeler: A Novel Input Enriched Website Fingerprinting Attack on Tor Onion Services.- Web Security.- Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real Time Smart Contract Analysis.- Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts.-ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection.- EasyCSPeasy: A Server side and Language agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP.- Encoder based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection.- Bag of Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security.- AutoS2ploit: From Automotive Safety Critical Functionalities to Security Exploit.- Pitfalls of data masking techniques: Re-identification attacks.- Faster Three Party Constant round Comparison with Application in Neural Network Inference.- WtLDP:Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy.- Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.