Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee) (2025. vii, 482 S. VII, 482 p. 128 illus. 235 mm)

個数:
  • 予約
  • ポイントキャンペーン

Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee) (2025. vii, 482 S. VII, 482 p. 128 illus. 235 mm)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783031944543

Full Description

This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.

The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on

Privacy and Cryptography

AI for cybersecurity and Adversial models

Quantum Computing in Cybersecurity

Network Security

Blockchain and Cryptocurrencies

Fuzzing and IoT security

Malware and Attack Analysis

Web Security

Authentication

Large Language Model for Cybersecurity

Security Assessments

Contents

Fuzzing and IoT security.- Fast Firmware Fuzz with Input/Output Reposition.- ChipFuzzer: Towards Fuzzing Matter based IoT Devices for Vulnerability Detection.- Reusablity Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity.- Multi Server Publicly Verifiable Computation of polynomials.- Siamese Neural Network for Robust IoT Device Type Identification: A Few Shot Learning Approach.- FISFuzzer: A Grey Box Protocol Fuzzer Based on Field Inference and Scheduling.- Malware and Attack Analysis.- Mal POBM: A Genetic Algorithm for Malware Adversarial Sample Generation.- Graphite: Real Time Graph Based Detection of Windows Fileless Malware Attacks.- Robust Network Intrusion Detection via Semi-Supervised Deep Reinforcement Learning.- BinSimDB: Benchmark Dataset Construction for Fine Grained Binary Code Similarity Analysis.- OnionPeeler: A Novel Input Enriched Website Fingerprinting Attack on Tor Onion Services.- Web Security.- Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real Time Smart Contract Analysis.- Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts.-ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection.- EasyCSPeasy: A Server side and Language agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP.- Encoder based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection.- Bag of Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security.- AutoS2ploit: From Automotive Safety Critical Functionalities to Security Exploit.- Pitfalls of data masking techniques: Re-identification attacks.- Faster Three Party Constant round Comparison with Application in Neural Network Inference.- WtLDP:Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy.- Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification.

最近チェックした商品