Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Availability, Reliability and Security -

Availability, Reliability and Security

20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I
Buch | Softcover
XXVII, 439 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-00623-3 (ISBN)
CHF 109,95 inkl. MwSt

This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.
The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions.
They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.









Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.- Prink: ks-Anonymization for Streaming Data in Apache Flink.- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences.- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles.- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection.- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks.- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks.- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model.- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.- Gradient Inversion of Federated Diffusion Models.- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.- BTDT: Membership Inference Attacks against Large Language Models.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XXVII, 439 p. 112 illus., 95 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Communication Security • Dependability • embedded systems security • Forensics • IoT security • Malware • Network Security • privacy • Privacy-Enhancing Technologies • Reliability • security • Security Awareness • System Security
ISBN-10 3-032-00623-6 / 3032006236
ISBN-13 978-3-032-00623-3 / 9783032006233
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95