Foundations and Practice of Security (Record no. 87895)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05606nam a22006255i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-57537-2 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171926.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240424s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031575372 |
-- | 978-3-031-57537-2 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Foundations and Practice of Security |
Sub Title | 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIX, 460 p. 120 illus., 94 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World-Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. . |
700 1# - AUTHOR 2 | |
Author 2 | Mosbah, Mohamed. |
700 1# - AUTHOR 2 | |
Author 2 | Sèdes, Florence. |
700 1# - AUTHOR 2 | |
Author 2 | Tawbi, Nadia. |
700 1# - AUTHOR 2 | |
Author 2 | Ahmed, Toufik. |
700 1# - AUTHOR 2 | |
Author 2 | Boulahia-Cuppens, Nora. |
700 1# - AUTHOR 2 | |
Author 2 | Garcia-Alfaro, Joaquin. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-57537-2 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Engineering and Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1611-3349 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.