Information Security Applications
Springer Verlag, Singapore
9789819568567 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
The 26 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: System & Application Security, 5G & Network Security, Cybersecurity Education & Model Security, Security Analysis & Verification, Malware & Forensics, Quantum & Cryptography, AI/LLM for Security, Privacy & Anonymity and IoT & Traffic Analysis.
.- System & Application Security
.- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV.
.- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes.
.- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection.
.- 5G & Network Security
.- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems.
.- Toward a Stealth Mode of 5G-AKA.
.- Cybersecurity Education & Model Security
.- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance.
.- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source.
.- Security Analysis & Verification
.- Impossible Differential Attack on SAND-64.
.- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger.
.- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs.
.- Malware & Forensics
.- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations.
.- Interaction-Aware System Call Sequence Analysis for Android Malware Classification.
.- Quantum & Cryptography
.- Depth-Optimized Quantum Implementation of CHAM.
.- Quantum Implementation and Analysis of SHA-1.
.- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions.
.- AI/LLM for Security
.- Detecting Malicious JavaScript Code by Code-Specialized LLM.
.- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models.
.- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework.
.- Privacy & Anonymity
.- Towards Sender Anonymity for Singleton Sets.
.- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models.
.- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach.
.- IoT & Traffic Analysis
.- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries.
.- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures.
.- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.
| Erscheint lt. Verlag | 20.2.2026 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | Approx. 400 p. |
| Verlagsort | Singapore |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Weitere Themen ► Hardware | |
| Schlagworte | AI Security • Analysis of network and security protocols • Anonymity and censorship-resistant technologies • Applications of cryptographic techniques • authentication and authorization • Automated tools for source code/binary analysis • Automobile security • blockchain security • Botnet defense • Critical Infrastructure Security • Denial-of-service attacks and countermeasures • digital forensics • embedded systems security • Exploit techniques and automation • Hardware and physical security • HCI security and privacy |
| ISBN-13 | 9789819568567 / 9789819568567 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich