Nemec Zlatolas / Garcia-Alfaro / Rannenberg | ICT Systems Security and Privacy Protection | Buch | 978-3-031-92885-7 | sack.de

Buch, Englisch, 280 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 610 g

Reihe: IFIP Advances in Information and Communication Technology

Nemec Zlatolas / Garcia-Alfaro / Rannenberg

ICT Systems Security and Privacy Protection

40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part II
Erscheinungsjahr 2025
ISBN: 978-3-031-92885-7
Verlag: Springer Nature Switzerland

40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21-23, 2025, Proceedings, Part II

Buch, Englisch, 280 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 610 g

Reihe: IFIP Advances in Information and Communication Technology

ISBN: 978-3-031-92885-7
Verlag: Springer Nature Switzerland


The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 

The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

Nemec Zlatolas / Garcia-Alfaro / Rannenberg ICT Systems Security and Privacy Protection jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Applied Cryptography.

.- CoolTest: Improved Randomness Testing Using Boolean Functions.

.- Towards a lightweight and privacy friendly Architecture for Online Advertising.

.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats.

.- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices.

.- Data and Application Security.

.- Generating and Attacking Passwords with Misspellings by Leveraging Homophones.

.- Time is money: A temporal model of cybersecurity.

.- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities.

.- ”You still have to study” On the Security of LLM generated code.

.- Certifiably robust malware detectors by design.

.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World.

.- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes.

.- International Workshop on Network and Distributed Systems Security (WNDSS 2025).

.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.

.- Impact Analysis of Sybil Attacks in the Tor Network.

.- Security Metrics for False Data Injection in Smart Grids.

.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.

.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack.

.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.

.- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.