Secure IT Systems : 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings (Lecture Notes in Computer Science)

個数:

Secure IT Systems : 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 502 p.
  • 言語 ENG
  • 商品コード 9783031790065

Full Description

This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 6-7, 2024.

The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.

Contents

.- Authentication.

.- Are Swedish Passwords Tougher Than the Rest?.

.- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling.

.- Cryptography.

.- Determining the A5 encryption algorithms used in 2G (GSM) networks.

.- Misbinding Raw Public Keys to Identities in TLS.

.- Small Private Exponent Attacks on Takagi Family Schemes.

.- Cyber-Physical Systems.

.- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks.

.- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform.

.- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study.

.- Cybersecurity and Policy.

.- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights.

.- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.

.- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare.

.- LLMs for Security.

.- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates.

.- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models.

.- The Dual-Edged Sword of Large Language Models in Phishing.

.- Formal Verification.

.- Analysing TLS Implementations using Full-Message Symbolic Execution.

.- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors.

.- Mobile & IoT.

.- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones.

.- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker.

.- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study.

.- Network Security.

.- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.

.- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization.

.- Formally Discovering and Reproducing Network Protocols Vulnerabilities.

.- Privacy.

.- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm.

.- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies.

.- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.

最近チェックした商品