- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Computer & Internet
- > general surveys & lexicons
Full Description
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.
The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).
Contents
.- Applied Cryptography.
.- CoolTest: Improved Randomness Testing Using Boolean Functions.
.- Towards a lightweight and privacy friendly Architecture for Online Advertising.
.- Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post Quantum Threats.
.- Checking the Impact of Security Standardization A Case Study on Bluetooth LE Pairing of Internet of Things Devices.
.- Data and Application Security.
.- Generating and Attacking Passwords with Misspellings by Leveraging Homophones.
.- Time is money: A temporal model of cybersecurity.
.- Update at Your Own Risk: Analysis and Recommendations for Update related Vulnerabilities.
.- "You still have to study" On the Security of LLM generated code.
.- Certifiably robust malware detectors by design.
.- How stealthy is stealthy? Studying the Efficacy of Black Box Adversarial Attacks in the Real World.
.- Identifying and Analyzing Vulnerabilities and Exploits in On Premises Kubernetes.
.- International Workshop on Network and Distributed Systems Security (WNDSS 2025).
.- A Novel Evidence-Based Threat Enumeration Methodology for ICS.
.- Impact Analysis of Sybil Attacks in the Tor Network.
.- Security Metrics for False Data Injection in Smart Grids.
.- BERMUDA: A BPSec Compatible Key Management Scheme for DTNs.
.- A Quantum Algorithm for Assessing Node Importance in the st Connectivity Attack.
.- Flatdc: Automatic Schema Reverse Engineering of FlatBuffers.
.- Time Aware Face Anti Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.