The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025. 

The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).

Les mer

The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.

Les mer

.- Applied Cryptography.

.- CoolTest: Improved Randomness Testing Using Boolean Functions.

.- Towards a lightweight and privacy friendly Architecture for Online Advertising.

.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats.

.- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices.

.- Data and Application Security.

.- Generating and Attacking Passwords with Misspellings by Leveraging Homophones.

.- Time is money: A temporal model of cybersecurity.

.- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities.

.- ”You still have to study” On the Security of LLM generated code.

.- Certifiably robust malware detectors by design.

.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World.

.- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes.

.- International Workshop on Network and Distributed Systems Security (WNDSS 2025).

.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.

.- Impact Analysis of Sybil Attacks in the Tor Network.

.- Security Metrics for False Data Injection in Smart Grids.

.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.

.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack.

.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.

.- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.

Les mer
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer

Produktdetaljer

ISBN
9783031928857
Publisert
2025-05-16
Utgiver
Vendor
Springer International Publishing AG
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, UP, 06, 05
Språk
Product language
Engelsk
Format
Product format
Innbundet
Orginaltittel
ICT Systems Security and Privacy Protection