Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: "security"



Treffer 258 von 69580 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1388936828
Titel Network and System Security : 19th International Conference, NSS 2025, Wuhan, China, December 5–7, 2025, Proceedings / edited by Jiageng Chen, Debiao He, Wei Xie
Person(en) Chen, Jiageng (Herausgeber)
He, Debiao (Herausgeber)
Xie, Wei (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Singapore : Springer Nature Singapore, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XIII, 404 p. 119 illus., 104 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-981-95-6418-7
Printed edition:: ISBN: 978-981-95-6420-0
Inhalt -- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment. -- IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain. -- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior. -- Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives. -- Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control. -- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices. -- HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection. -- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection. -- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention. -- Post-quantum Blockchain Transaction Model Based on Dilithium. -- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach. -- Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing. -- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment. -- Real-Time Anomaly Detection for Event-based Insider Threat Hunting. -- A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection. -- Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples. -- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features. -- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs. -- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis
Persistent Identifier URN: urn:nbn:de:101:1-2602040310310.177470399719
DOI: 10.1007/978-981-95-6419-4
URL https://doi.org/10.1007/978-981-95-6419-4
ISBN/Einband/Preis 978-981-95-6419-4
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 16326
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 258 von 69580
< < > <


E-Mail-IconAdministration