Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part I (Lecture Notes in Computer Science 15532) (2025. xvi, 416 S. XVI, 416 p. 113 illus., 79 illus. in color. 235 mm)

個数:

Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part I (Lecture Notes in Computer Science 15532) (2025. xvi, 416 S. XVI, 416 p. 113 illus., 79 illus. in color. 235 mm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 365 p.
  • 言語 ENG
  • 商品コード 9783031874987

Full Description

This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montréal, QC, Canada, during December 09-11, 2024.

The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections:

Part I: Critical issues of protecting systems against digital threats,considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical
infrastructure; New trends in advanced cryptographic protocols.
 
Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.

Contents

.- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications.
.- The Perfect Victim? Family Offices as Targets for Cybercriminals.
.- Advanced Real-Time Detection of Cyber Threat Information from Tweets.
.- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks.
.- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective.
.- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations.
.- Automating and enhancing security mechanisms in software systems and data management.
.- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts.
.- An Approach to Determine a System's Behavioural Security Posture.
.- Secure Data Traceability for Mobile DataCollectors.
.- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy.
.- Cybersecurity and AI when applied to emerging technologies.
.- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things.
.- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis.
.- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning.
.- A Tool for Enabling Scalable Automation in Security Control Selection.
.- Cybersecurity and Ethics.
.- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice.
.- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining.
.- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection.
.- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection.
.- Parametric Automata for Dynamic Access Control Policies.
.- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure.
.- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses.
.- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps.
.- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security.
.- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments.
.- Detecting Cyber Attacks on Electric Vehicles Charging Stations.
.- New trends in advanced cryptographic protocols.
.- Secure Voting Protocol Using Balance Scale.
.- Monitoring the execution of cryptographic functions.
.- RouterORAM: An O(1)-latency and client-work ORAM.

最近チェックした商品