• Neu
Rodrigues / Oliveira | Dependable and Secure Computing | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 378 Seiten

Reihe: Computer Science (R0)

Rodrigues / Oliveira Dependable and Secure Computing

14th Latin-American Symposium, LADC 2025, Valparaíso, Chile, October 27–31, 2025, Proceedings
Erscheinungsjahr 2026
ISBN: 978-3-032-11539-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

14th Latin-American Symposium, LADC 2025, Valparaíso, Chile, October 27–31, 2025, Proceedings

E-Book, Englisch, 378 Seiten

Reihe: Computer Science (R0)

ISBN: 978-3-032-11539-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.

The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows: 

Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track,  and Student Forum. 

Rodrigues / Oliveira Dependable and Secure Computing jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Security Foundations and Compliance.
.- Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil.
.- SPIRE-Based Remote Attestation for Secure VPN Access.
.- Towards a Minimum Security Baseline for Cyber-Physical Systems through Security Standards Harmonization.
.- Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment.
.- AI for Security and Dependability.
.- An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment.
.- FlowMon: A Workflow-Driven Visual Tool for Automated Monitoring Script Generation.
.- Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum-Based LLM Framework.
.- Consensus, Cryptography, and Blockchain.
.- A Blockchain-Based Architecture for Communication Between Spectrum Access Systems.
.- Byzantine Consensus with Secure and Intrusion-Tolerant In-Network Ordering.
.- Thetacrypt: A Distributed Service for Threshold Cryptography.
.- Modeling and Dependability Evaluation.
.- A Practical TLA+ Library for Designing and Verifying Distributed Systems.
.- Long-Term Experimental Evaluation of Software Aging Effects in NoSQL Database.
.- Advances in Dependable and Secure Computing (Best Paper Candidates).
.- Addressing Cryptographic Overheads in Low-Latency File Systems through Ahead-of-Time Encryption.
.- Evaluating eBPF as an Alternative to Virtual Machine Introspection for High-Interaction Honeypot Implementation.
.- Source Code Vulnerability Detection and Interpretability with Language Models.
.- Monitoring and Critical Infrastructures.
.- Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach.
.- Quantitative Availability Analysis of Fog-Edge Monitoring Architectures in Bus Rapid Transit Station.
.- Industry Track.
.- Malware Detection in Windows Operating Systems using AI and In-Memory Process Analysis.
.- Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach.
.- Student Forum.
.- Improving Safety in Industry 4.0 using an IoT-Helmet.
.- Forecasting-Oriented Management of Software-Defined Fabric Environments.
.- Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies.
.- Towards Hierarchical Byzantine Distributed Replication.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.