libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

dalla preda mila (curatore); schrittwieser sebastian (curatore); naessens vincent (curatore); de sutter bjorn (curatore) - availability, reliability and security
Zoom

Availability, Reliability and Security 20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I

; ; ;




Disponibilità: Non disponibile o esaurito presso l'editore


PREZZO
102,98 €



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 09/2025





Trama

This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.
The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions.
They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.













Sommario

Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.- Prink: ks-Anonymization for Streaming Data in Apache Flink.- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences.- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles.- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection.- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks.- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks.- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model.- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.- Gradient Inversion of Federated Diffusion Models.- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.- BTDT: Membership Inference Attacks against Large Language Models.











Altre Informazioni

ISBN:

9783032006233

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XVII, 424 p. 112 illus.
Pagine Arabe: 424
Pagine Romane: xvii


Dicono di noi