Dalla Preda / Schrittwieser / Naessens | Availability, Reliability and Security | E-Book | www.sack.de
E-Book

E-Book, Englisch, 439 Seiten

Reihe: Lecture Notes in Computer Science

Dalla Preda / Schrittwieser / Naessens Availability, Reliability and Security

20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I
Erscheinungsjahr 2025
ISBN: 978-3-032-00624-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

20th International Conference, ARES 2025, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I

E-Book, Englisch, 439 Seiten

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-032-00624-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.
The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions.
They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.

Dalla Preda / Schrittwieser / Naessens Availability, Reliability and Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.- Prink: ks-Anonymization for Streaming Data in Apache Flink.- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences.- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles.- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection.- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks.- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks.- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model.- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.- Gradient Inversion of Federated Diffusion Models.- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.- BTDT: Membership Inference Attacks against Large Language Models.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.