Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "security"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/1388936828 |
| Titel | Network and System Security : 19th International Conference, NSS 2025, Wuhan, China, December 5–7, 2025, Proceedings / edited by Jiageng Chen, Debiao He, Wei Xie |
| Person(en) |
Chen, Jiageng (Herausgeber) He, Debiao (Herausgeber) Xie, Wei (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Singapore : Springer Nature Singapore, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XIII, 404 p. 119 illus., 104 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-981-95-6418-7 Printed edition:: ISBN: 978-981-95-6420-0 |
| Inhalt | -- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment. -- IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain. -- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior. -- Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives. -- Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control. -- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices. -- HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection. -- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection. -- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention. -- Post-quantum Blockchain Transaction Model Based on Dilithium. -- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach. -- Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing. -- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment. -- Real-Time Anomaly Detection for Event-based Insider Threat Hunting. -- A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection. -- Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples. -- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features. -- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs. -- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2602040310310.177470399719 DOI: 10.1007/978-981-95-6419-4 |
| URL | https://doi.org/10.1007/978-981-95-6419-4 |
| ISBN/Einband/Preis | 978-981-95-6419-4 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes in Computer Science ; 16326 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

