Buch, Englisch, 378 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 593 g
14th Latin-American Symposium, LADC 2025, Valparaíso, Chile, October 27-31, 2025, Proceedings
Buch, Englisch, 378 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 593 g
Reihe: Communications in Computer and Information Science
ISBN: 978-3-032-11538-6
Verlag: Springer
This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows:
Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track, and Student Forum.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Rechnerarchitektur
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
Weitere Infos & Material
.- Security Foundations and Compliance.
.- Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil.
.- SPIRE-Based Remote Attestation for Secure VPN Access.
.- Towards a Minimum Security Baseline for Cyber-Physical Systems through Security Standards Harmonization.
.- Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment.
.- AI for Security and Dependability.
.- An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment.
.- FlowMon: A Workflow-Driven Visual Tool for Automated Monitoring Script Generation.
.- Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum-Based LLM Framework.
.- Consensus, Cryptography, and Blockchain.
.- A Blockchain-Based Architecture for Communication Between Spectrum Access Systems.
.- Byzantine Consensus with Secure and Intrusion-Tolerant In-Network Ordering.
.- Thetacrypt: A Distributed Service for Threshold Cryptography.
.- Modeling and Dependability Evaluation.
.- A Practical TLA+ Library for Designing and Verifying Distributed Systems.
.- Long-Term Experimental Evaluation of Software Aging Effects in NoSQL Database.
.- Advances in Dependable and Secure Computing (Best Paper Candidates).
.- Addressing Cryptographic Overheads in Low-Latency File Systems through Ahead-of-Time Encryption.
.- Evaluating eBPF as an Alternative to Virtual Machine Introspection for High-Interaction Honeypot Implementation.
.- Source Code Vulnerability Detection and Interpretability with Language Models.
.- Monitoring and Critical Infrastructures.
.- Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach.
.- Quantitative Availability Analysis of Fog-Edge Monitoring Architectures in Bus Rapid Transit Station.
.- Industry Track.
.- Malware Detection in Windows Operating Systems using AI and In-Memory Process Analysis.
.- Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach.
.- Student Forum.
.- Improving Safety in Industry 4.0 using an IoT-Helmet.
.- Forecasting-Oriented Management of Software-Defined Fabric Environments.
.- Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies.
.- Towards Hierarchical Byzantine Distributed Replication.




