
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024.
The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identi?cation & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.
.- Abstracts of Invited Talks.
.- Horizontal Attack from Theory to Practice.
.- Security for Safety Critical Systems in the Railways.
.- Security Network Protocols.
.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.
.- Card-Based Secure Evaluation of Decision Trees.
.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.
.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.
.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.
.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.
.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.
.- AI-Driven Threat Detection.
.- On the Properness of Large Language Models for Malware Detection.
.- Automated Attack Tree Generation Using Arti?cial Intelligence & Natural Language Processing.
.- Classifying Insider Threat Scenarios Through Explainable Arti?cial Intelligence.
.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.
.- Information Security Management.
.- ECU-KM : An E?cient Key Management for In-Vehicle Networks.
.- Injecting Bias into Text Classi?cation Models Using Backdoor Attacks.
.- Towards New Models of Information Sharing.
.- Distributed and Veri?able Digital Badges.
.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.
.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.
.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.
.- Applied Cryptography & Privacy.
.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.
.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.
.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.
.- Threats Detection & Protection.
.- Preventing WebRTC IP Address Leaks.
.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.
.- Device Fingerprinting Remediation in Android and iOS Apps.
.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.
.- Risk Identi?cation & Management.
.- A Safety Kernel for Flexible Level Crossing Management.
.- E?cient Identi?cation of UAVs Through Automatic Communication Frame Linking.
.- Enterprise Risk Management in SMEs : Insights from West Africa.
.- Blockchain & Distributed Ledger Security.
.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.
.- Modeling and Assessing Coercion Threats in Electronic Voting.
.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.
.- AI for Security Assessment.
.- Automated Assessment of the Exploits Using Deep Learning Methods.
.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O?.
.- Relevance of Image-Based Representation for Android Malware Detection.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.