Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Information Security Applications

26th International Conference, WISA 2025, Jeju Island, South Korea, August 20–22, 2025, Revised Selected Papers

Ki-Woong Park, Jungsoo Park (Herausgeber)

Buch | Softcover
2026
Springer Verlag, Singapore
9789819568567 (ISBN)
CHF 109,95 inkl. MwSt
  • Titel nicht im Sortiment
  • Artikel merken
This book constitutes the refereed proceedings of the 26th International Conference on Information Security Applications, WISA 2025, held in Jeju Island, South Korea, during August 20–22, 2025.


The 26 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: System & Application Security, 5G & Network Security, Cybersecurity Education & Model Security, Security Analysis & Verification, Malware & Forensics, Quantum & Cryptography, AI/LLM for Security, Privacy & Anonymity and IoT & Traffic Analysis.

 

.- System & Application Security 
 
.- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV.
.- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes.
.- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection.
 
.-   5G & Network Security
 
.- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems.
.- Toward a Stealth Mode of 5G-AKA.
 
.- Cybersecurity Education & Model Security
 
.- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance.
.- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source.
 
.- Security Analysis & Verification
 
.- Impossible Differential Attack on SAND-64.
.- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger.
.- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs.
 
.- Malware & Forensics
 
.- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations.
.- Interaction-Aware System Call Sequence Analysis for Android Malware Classification.
 
.- Quantum & Cryptography
 
.- Depth-Optimized Quantum Implementation of CHAM.
.- Quantum Implementation and Analysis of SHA-1.
.- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions.
 
.- AI/LLM for Security
 
.- Detecting Malicious JavaScript Code by Code-Specialized LLM.
.- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models.
.- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework.
 
.- Privacy & Anonymity
 
.- Towards Sender Anonymity for Singleton Sets.
.- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models.
.- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach.
 
.- IoT & Traffic Analysis
 
.- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries.
.- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures.
.- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.

Erscheint lt. Verlag 20.2.2026
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo Approx. 400 p.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Hardware
Schlagworte AI Security • Analysis of network and security protocols • Anonymity and censorship-resistant technologies • Applications of cryptographic techniques • authentication and authorization • Automated tools for source code/binary analysis • Automobile security • blockchain security • Botnet defense • Critical Infrastructure Security • Denial-of-service attacks and countermeasures • digital forensics • embedded systems security • Exploit techniques and automation • Hardware and physical security • HCI security and privacy
ISBN-13 9789819568567 / 9789819568567
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95