Nemec Zlatolas / Garcia-Alfaro / Rannenberg | ICT Systems Security and Privacy Protection | Buch | 978-3-031-92881-9 | sack.de

Buch, Englisch, 254 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 569 g

Reihe: IFIP Advances in Information and Communication Technology

Nemec Zlatolas / Garcia-Alfaro / Rannenberg

ICT Systems Security and Privacy Protection

40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part I
Erscheinungsjahr 2025
ISBN: 978-3-031-92881-9
Verlag: Springer Nature Switzerland

40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part I

Buch, Englisch, 254 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 569 g

Reihe: IFIP Advances in Information and Communication Technology

ISBN: 978-3-031-92881-9
Verlag: Springer Nature Switzerland


The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 

The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

Nemec Zlatolas / Garcia-Alfaro / Rannenberg ICT Systems Security and Privacy Protection jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Privacy protection.

.- Advanced strategies for privacy preserving data publishing to improve multi class classification.

.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers.

.- SAAFL: Secure Aggregation for Label Aware Federated Learning.

.- “We’ve met some problems”: Developers’ Issues With Privacy Preserving Computation Techniques on Stack Overflow.

.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.

.- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform.

.- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration.

.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.

.- Industrial and Critical Infrastructure Security.

.- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic.

.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems.

.- Certified Secure Updates for IoT Devices.

.- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing.

.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems.

.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.

.- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation.

.- SAVA Deployment for Spoofed Source Attacks.

.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.