Skopik / Naessens / De Sutter | Availability, Reliability and Security | E-Book | www.sack.de
E-Book

E-Book, Englisch, 342 Seiten

Reihe: Lecture Notes in Computer Science

Skopik / Naessens / De Sutter Availability, Reliability and Security

ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II
Erscheinungsjahr 2025
ISBN: 978-3-032-00644-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part II

E-Book, Englisch, 342 Seiten

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-032-00644-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions.

They contain papers of the following workshops:

Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025).

Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025).

Skopik / Naessens / De Sutter Availability, Reliability and Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


5th Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025): WalkthroughCyber: Teaching Cyber-Awareness in Montessori Middle Schools.- An Exploratory Study on Teaching Software Supply Chain Security Concepts to High School Students.- Challenges in adapting an industrial training course for academia – a cybersecurity risk management course case study.- Psychological and Behavioral aspects and system dynam-ics: insights from exercises using a cyber range.- Cybersecurity Micro-credentials and Career Path Design: the Digital4Security Good Practices.- On Demand Cybersecurity Sandboxes Through Kubernetes.- Enhancing Cybersecurity Curriculum Development Through European Cybersecurity Framework and Transformer Models. 5th International Workshop on Security Testing and Monitoring (STAM 2025): Evaluating Large Language Models for Vulnerability Detection Under Realistic Conditions.- LLMs in Security Testing and Monitoring: An Initial Study.- A decentralized PUF-based scheme for Remote Attestation.- Evaluating DAVS Approach for Docker Images Static Analysis.- SAM-CyFra: A System for the Automated Management of Cybersecurity Frameworks.- An Intelligent Network Fuzzer with an Application in DICOM Protocol Testing.- Detection of Adversarial Examples by Adversarial Training: a Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks.- NERO Training Methodology and Initial Results. 8th International Workshop on Emerging Network Security (ENS 2025): Proposition of IT platform for combating wildfires with Decision Support System.- Steganographic Channels in Body Area Networks.- SHAP Insights Into Domain Adaptation in Netflow-based Network Intrusion Detection powered by Deep Learning.- Real-world Identity and Access Management scenarios simulations in the SILVANUS Project.- 5G-Pentest-UE: A Penetration Testing Framework for Identifying 5G System Vulnerabilities.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.