The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 

The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

Read more

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.

Read more

.- Applied Cryptography.

.- CoolTest: Improved Randomness Testing Using Boolean Functions.

.- Towards a lightweight and privacy friendly Architecture for Online Advertising.

.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats.

.- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices.

.- Data and Application Security.

.- Generating and Attacking Passwords with Misspellings by Leveraging Homophones.

.- Time is money: A temporal model of cybersecurity.

.- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities.

.- ”You still have to study” On the Security of LLM generated code.

.- Certifiably robust malware detectors by design.

.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World.

.- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes.

.- International Workshop on Network and Distributed Systems Security (WNDSS 2025).

.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.

.- Impact Analysis of Sybil Attacks in the Tor Network.

.- Security Metrics for False Data Injection in Smart Grids.

.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.

.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack.

.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.

.- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.

Read more
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Read more

Product details

ISBN
9783031928857
Published
2025-05-16
Publisher
Springer International Publishing AG; Springer International Publishing AG
Height
235 mm
Width
155 mm
Age
Research, P, UP, 06, 05
Language
Product language
Engelsk
Format
Product format
Innbundet
Number of pages
280
Original title
ICT Systems Security and Privacy Protection