Risks and Security of Internet and Systems : 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings (Lecture Notes in Computer Science)

個数:
  • ポイントキャンペーン

Risks and Security of Internet and Systems : 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings (Lecture Notes in Computer Science)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 560 p.
  • 言語 ENG
  • 商品コード 9783031893490
  • DDC分類 005.8

Full Description

This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024.

The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.

Contents

.- Abstracts of Invited Talks.

.- Horizontal Attack from Theory to Practice.

.- Security for Safety Critical Systems in the Railways.

.- Security Network Protocols.

.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.

.- Card-Based Secure Evaluation of Decision Trees.

.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.

.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.

.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.

.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.

.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.

.- AI-Driven Threat Detection.

.- On the Properness of Large Language Models for Malware Detection.

.- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing.

.- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence.

.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.

.- Information Security Management.

.- ECU-KM : An Efficient Key Management for In-Vehicle Networks.

.- Injecting Bias into Text Classification Models Using Backdoor Attacks.

.- Towards New Models of Information Sharing.

.- Distributed and Verifiable Digital Badges.

.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.

.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.

.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.

.- Applied Cryptography & Privacy.

.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.

.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.

.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.

.- Threats Detection & Protection.

.- Preventing WebRTC IP Address Leaks.

.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.

.- Device Fingerprinting Remediation in Android and iOS Apps.

.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.

.- Risk Identification & Management.

.- A Safety Kernel for Flexible Level Crossing Management.

.- Efficient Identification of UAVs Through Automatic Communication Frame Linking.

.- Enterprise Risk Management in SMEs : Insights from West Africa.

.- Blockchain & Distributed Ledger Security.

.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.

.- Modeling and Assessing Coercion Threats in Electronic Voting.

.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.

.- AI for Security Assessment.

.- Automated Assessment of the Exploits Using Deep Learning Methods.

.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-Off.

.- Relevance of Image-Based Representation for Android Malware Detection.

最近チェックした商品