Katalog der Deutschen Nationalbibliothek

Neuigkeiten Donnerstag, 11. September 2025: Die Deutsche Nationalbibliothek öffnet wegen eines Beschäftigtentreffens an beiden Standorten erst um 15 Uhr. // Thursday, 11 September 2025: The German National Library will not open until 15:00 due to a staff meeting at both locations.
 
 

Ergebnis der Suche nach: "Machine Learning"



Treffer 238 von 37178 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1373477709
Art des Inhalts Konferenzschrift
Titel Availability, Reliability and Security : 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II / edited by Mila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
Person(en) Dalla Preda, Mila (Herausgeber)
Schrittwieser, Sebastian (Herausgeber)
Naessens, Vincent (Herausgeber)
De Sutter, Bjorn (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2025
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2025
Umfang/Format Online-Ressource, XXI, 433 p. 96 illus., 86 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-032-00626-4
Printed edition:: ISBN: 978-3-032-00628-8
Inhalt Usable Security and Awareness: QRisk: Think Before You Scan QR codes -- Evaluating Argon2 Adoption and Effectiveness in Real-World Software -- AdvisoryHub: Design and Evaluation of a Cross-Platform Security Advisory System for Cyber Situational Awareness -- Service-aware password risk meter – Helping users to choose suitable passwords in services. System Security: TEE-Assisted Recovery and Upgrades for Long-Running BFT Services -- Fast and Efficient Secure L1 Caches for SMT -- FatPTE - Expanding Page Table Entries for Security -- CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities -- Exploring speculation barriers for RISC-V selective speculation -- Do we still need canaries in the coal mine? Measuring shadow stack effectiveness in countering stack smashing. Supply Chain Security, Malware and Forensics: SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems -- Clustering Malware at Scale: A First Full-Benchmark Study -- Advances in Automotive Digital Forensics: Recent Trends and Future Directions -- Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects. Machine Learning and Security: Multi-Agent Simulation and Reinforcement Learning to Optimize Moving Target Defense -- LeaX: Class-Focused Explanations for Locating Leakage in Learning-based Profiling Attacks -- Large Language Models are Unreliable for Cyber Threat Intelligence -- Augmented Tabular Adversarial Evasion Attacks with Constraint Satisfaction Guarantees -- TTP Classification with Minimal Labeled Data: A Retrieval-Based Few-Shot Learning Approach -- C2 Beaconing Detection via AI-based Time-Series Analysis -- Fooling Rate and Perceptual Similarity: A Study on the Effectiveness and Quality of DCGAN-based Adversarial Attacks
Persistent Identifier URN: urn:nbn:de:101:1-2508100405450.946958316318
DOI: 10.1007/978-3-032-00627-1
URL https://doi.org/10.1007/978-3-032-00627-1
ISBN/Einband/Preis 978-3-032-00627-1
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 15993
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 238 von 37178
< < > <


E-Mail-IconAdministration