Coppens / Volckaert / Naessens | Availability, Reliability and Security | Buch | 978-3-032-00629-5 | sack.de

Buch, Englisch, 360 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 593 g

Reihe: Lecture Notes in Computer Science

Coppens / Volckaert / Naessens

Availability, Reliability and Security

ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I
Erscheinungsjahr 2025
ISBN: 978-3-032-00629-5
Verlag: Springer

ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I

Buch, Englisch, 360 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 593 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-032-00629-5
Verlag: Springer


This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. 

The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions.

They contain papers of the following workshops:

Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025).

Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025).

Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025).

Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).

Coppens / Volckaert / Naessens Availability, Reliability and Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025): Profiling Electric Vehicles via Early Charging Voltage Patterns.- ARCeR: an Agentic RAG for the Automated Definition of Cyber Ranges.- Edge Virtual Fence for Smart Airport Physical Security: A Case Study.- Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics.- A Multi-Dataset Evaluation of Models for Automated Vulnerability Repair.- Adversarial Robustness of Machine Learning-based Access Control.- Towards Robust Artificial Intelligence: Self-Supervised Learning Approach for Out-of-Distribution Detection. Eighth International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2025): Performance Evaluation of Quantum-Resistant Algorithms on Industrial Embedded Systems.- TADFICS: A Threat-Aware Digital Forensics Data Model for ICS.- A Robust Hybrid Framework Combining Deductive Temporal Logic and Machine Learning for Fault and Cyber-Attack Detection in the Tennessee Eastman Process.- KIDS: Intrusion Detection for Industrial Control Systems. First Workshop on Sustainable Security and Awareness For nExt Generation infRastructures (SAFER 2025): Effects of the Cyber Resilience Act (CRA) on Industrial Equipment Manufacturing Companies.- Dynamic Access Policies for Energy Cost Management of Microservices.- Are Trees Really Green? A Detection Approach of IoT Malware Attacks.- Towards A Capability Model of Kubernetes Runtime Security Enforcement Mechanisms. Fourth Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025): A Method for Explainable Anomaly detection in Substation Networks through Deep Learning.- Safety and Cybersecurity under Emerging EU Legislations for Industry: A Use-case Driven Perspective.- An Explainable Method for Malware Detection through Convolutional Neural Networks.- Securing the Additive Manufacturing Process Chain.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.