• Neu
Collart-Dutilleul / Ouchani / Cuppens | Risks and Security of Internet and Systems | E-Book | sack.de
E-Book

E-Book, Englisch, 560 Seiten

Reihe: Lecture Notes in Computer Science

Collart-Dutilleul / Ouchani / Cuppens Risks and Security of Internet and Systems

19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings
Erscheinungsjahr 2025
ISBN: 978-3-031-89350-6
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings

E-Book, Englisch, 560 Seiten

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-89350-6
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024.

The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identi?cation & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.

Collart-Dutilleul / Ouchani / Cuppens Risks and Security of Internet and Systems jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Abstracts of Invited Talks.

.- Horizontal Attack from Theory to Practice.

.- Security for Safety Critical Systems in the Railways.

.- Security Network Protocols.

.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.

.- Card-Based Secure Evaluation of Decision Trees.

.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.

.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.

.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.

.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.

.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.

.- AI-Driven Threat Detection.

.- On the Properness of Large Language Models for Malware Detection.

.- Automated Attack Tree Generation Using Arti?cial Intelligence & Natural Language Processing.

.- Classifying Insider Threat Scenarios Through Explainable Arti?cial Intelligence.

.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.

.- Information Security Management.

.- ECU-KM : An E?cient Key Management for In-Vehicle Networks.

.- Injecting Bias into Text Classi?cation Models Using Backdoor Attacks.

.- Towards New Models of Information Sharing.

.- Distributed and Veri?able Digital Badges.

.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.

.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.

.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.

.- Applied Cryptography & Privacy.

.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.

.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.

.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.

.- Threats Detection & Protection.

.- Preventing WebRTC IP Address Leaks.

.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.

.- Device Fingerprinting Remediation in Android and iOS Apps.

.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.

.- Risk Identi?cation & Management.

.- A Safety Kernel for Flexible Level Crossing Management.

.- E?cient Identi?cation of UAVs Through Automatic Communication Frame Linking.

.- Enterprise Risk Management in SMEs : Insights from West Africa.

.- Blockchain & Distributed Ledger Security.

.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.

.- Modeling and Assessing Coercion Threats in Electronic Voting.

.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.

.- AI for Security Assessment.

.- Automated Assessment of the Exploits Using Deep Learning Methods.

.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O?.

.- Relevance of Image-Based Representation for Android Malware Detection.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.