Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: cod="ro"
![]() |
|
Link zu diesem Datensatz | https://d-nb.info/1365793028 |
Titel | ICT Systems Security and Privacy Protection : 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II / edited by Lili Nemec Zlatolas, Kai Rannenberg, Tatjana Welzer, Joaquin Garcia-Alfaro |
Person(en) |
Nemec Zlatolas, Lili (Herausgeber) Rannenberg, Kai (Herausgeber) Welzer, Tatjana (Herausgeber) Garcia-Alfaro, Joaquin (Herausgeber) |
Organisation(en) | SpringerLink (Online service) (Sonstige) |
Ausgabe | 1st ed. 2025 |
Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
Zeitliche Einordnung | Erscheinungsdatum: 2025 |
Umfang/Format | Online-Ressource, XIV, 280 p. 46 illus., 33 illus. in color. : online resource. |
Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-031-92885-7 Printed edition:: ISBN: 978-3-031-92887-1 Printed edition:: ISBN: 978-3-031-92888-8 |
Inhalt | -- Applied Cryptography. -- CoolTest: Improved Randomness Testing Using Boolean Functions. -- Towards a lightweight and privacy friendly Architecture for Online Advertising. -- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats. -- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices. -- Data and Application Security. -- Generating and Attacking Passwords with Misspellings by Leveraging Homophones. -- Time is money: A temporal model of cybersecurity. -- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities. -- ”You still have to study” On the Security of LLM generated code. -- Certifiably robust malware detectors by design. -- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World. -- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes. -- International Workshop on Network and Distributed Systems Security (WNDSS 2025). -- A Novel Evidence-Based Threat Enumeration Methodology for ICS. -- Impact Analysis of Sybil Attacks in the Tor Network. -- Security Metrics for False Data Injection in Smart Grids. -- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs. -- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack. -- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. -- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning |
Persistent Identifier |
URN: urn:nbn:de:101:1-2505160409006.205495315494 DOI: 10.1007/978-3-031-92886-4 |
URL | https://doi.org/10.1007/978-3-031-92886-4 |
ISBN/Einband/Preis | 978-3-031-92886-4 |
Sprache(n) | Englisch (eng) |
Beziehungen | IFIP Advances in Information and Communication Technology ; 746 |
DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
Sachgruppe(n) | 004 Informatik |
Online-Zugriff | Archivobjekt öffnen |
