Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: cod="ro"



Treffer 99994 von 4440850 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1365793028
Titel ICT Systems Security and Privacy Protection : 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II / edited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro
Person(en) Nemec Zlatolas, Lili (Herausgeber)
Rannenberg, Kai (Herausgeber)
Welzer, Tatjana (Herausgeber)
Garcia-Alfaro, Joaquin (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2025
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2025
Umfang/Format Online-Ressource, XIV, 280 p. 46 illus., 33 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-031-92885-7
Printed edition:: ISBN: 978-3-031-92887-1
Printed edition:: ISBN: 978-3-031-92888-8
Inhalt -- Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- ”You still have to study” On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning
Persistent Identifier URN: urn:nbn:de:101:1-2505160409006.205495315494
DOI: 10.1007/978-3-031-92886-4
URL https://doi.org/10.1007/978-3-031-92886-4
ISBN/Einband/Preis 978-3-031-92886-4
Sprache(n) Englisch (eng)
Beziehungen IFIP Advances in Information and Communication Technology ; 746
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 99994 von 4440850
< < > <


E-Mail-IconAdministration