Foundations and Practice of Security (Record no. 87895)

000 -LEADER
fixed length control field 05606nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-031-57537-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730171926.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240424s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031575372
-- 978-3-031-57537-2
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Foundations and Practice of Security
Sub Title 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIX, 460 p. 120 illus., 94 illus. in color.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World-Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers. .
700 1# - AUTHOR 2
Author 2 Mosbah, Mohamed.
700 1# - AUTHOR 2
Author 2 Sèdes, Florence.
700 1# - AUTHOR 2
Author 2 Tawbi, Nadia.
700 1# - AUTHOR 2
Author 2 Ahmed, Toufik.
700 1# - AUTHOR 2
Author 2 Boulahia-Cuppens, Nora.
700 1# - AUTHOR 2
Author 2 Garcia-Alfaro, Joaquin.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-57537-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks .
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Engineering and Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1611-3349 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC

No items available.