Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part I (Lecture Notes in Computer Science)

個数:
  • 予約

Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part I (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 499 p.
  • 言語 ENG
  • 商品コード 9783032078834

Full Description

This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22-24, 2025.

The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: 

AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. 

 

Contents

.- Time-Distributed Backdoor Attacks on Federated Spiking Learning.
.- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation.
.- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures.
.- PriSM: A Privacy-friendly Support vector Machine.
.- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models.
.- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing.
.- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks.
.- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO.
.- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk.
.- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states.
.- Membership Privacy Evaluation in Deep Spiking Neural Networks.
.- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?.
.- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers.
.- How Dataset Diversity Affects Generalization in ML-based NIDS.
.- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. 
.- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models.
.- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios.
.- Trigger-Based Fragile Model Watermarking for Image Transformation Networks.
.- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks.
.- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction.
.- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts.
.- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation.
.- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data.
.- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data.
.- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models.

最近チェックした商品