Security and Privacy in Cyber-Physical Systems and Smart Vehicles : Second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and

個数:

Security and Privacy in Cyber-Physical Systems and Smart Vehicles : Second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 368 p.
  • 商品コード 9783031933530

Full Description

This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7-8, 2024.

The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems.

Contents

Emerging Applications.- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics.- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing.- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer.- Security Techniques for Cyber-Physical Systems.- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots.- Software Bill of Materials Management for Embedded Vehicle Systems.- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement.- A Case Study of API Design for Interoperability and Security of the Internet of Things.- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments.- Hardware and Firmware Security.- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair.- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network.- RustBound: Function Boundary Detection over Rust Stripped Binaries.- Adversarial Attacks in Autonomous Systems.- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study.- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles.- Ethics, Privacy, and Human-Centric Considerations.- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Privacy-Enrooted Car Systems (PECS): Preliminary Design.- Demos.- Demo: All-in-One Solution for Online Abuse Research.

最近チェックした商品