Foundations and Practice of Security : 18th International Symposium, FPS 2025, Brest, France, November 25-27, 2025, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

個数:
  • 予約
  • ポイントキャンペーン

Foundations and Practice of Security : 18th International Symposium, FPS 2025, Brest, France, November 25-27, 2025, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032200174

Full Description

This two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice of Security, FPS 2025, held in Brest, France during November 25-27, 2025.

The 38 full and 8 short papers presented in this book were carefully reviewed and selected from 91 submissions. These papers were organized in the following topical sections:

Part I: Security, Privacy, and Trust in Emerging Distributed Systems; Cyber Resilience and Risk Management in Enterprise Architectures; Formal Methods and Automated Analysis for Secure Software Systems; Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation; Applications to Industry and Critical Infrastructure.
 
Part II: Advances in Privacy-Preserving Cryptography and Secure Computation; Secure and Intelligent Network Architectures for Next-Generation Communications; Secure, Explainable, and Efficient Machine Learning in Cybersecurity; Short Papers.

Contents

.- Security, Privacy, and Trust in Emerging Distributed Systems.
.- Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&ck Graph And Multi-criteria Optimization.
.- ForensicChain: Blockchain-based Secure Digital Forensic Investigations.
.- Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks.
.- Cyber Resilience and Risk Management in Enterprise Architectures.
.- Eliciting metrics and evaluating cyber resilience of a capability in the context of a multilayer enterprise architecture.
.- Predicting IoT Security Vulnerabilities from Device Specification.
.- Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators.
.- Optimizing Resilience in IT Architectures: A Multi-Objective Ontology-Based Approach.
.- Formal Methods and Automated Analysis for Secure Software Systems.
.- Vexed by VEXTools: Consistency Evaluation of Container Vulnerability Scanners.
.- Towards a formal verification of the Bao Hypervisor.
.- Finding Software Supply Chain Attack Paths with Logical Attack Graphs.
.- From provable models to provable implementations: translating Alice & Bob security protocols to F*.
.- Automatic Attack Script Generation: a MDA Approach.
.- Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody.
.- Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation.
.- A Grammar-Driven Approach to Model and Detect APT Attack Sequences.
.- Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation.
.- Systematic Security Context Weighting for Trust Algorithms via AI/ML Model Performance Analysis.
.- WildCode: An Empirical Analysis of Code Generated by ChatGPT.
.- Binary and Multiclass Cyberattack Classification on GeNIS Dataset.
.- Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models.
.- Applications to Industry and Critical Infrastructure.
.- An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity.
.- Towards adoption of private distributed ledgers for capital markets.
.- Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges.
.- Secure-by-Design Architectures for Cooperative Intelligent Transport Systems: A Standards-Aligned Approach.
.- Practical Evaluation of the Crypto-Agility Maturity Model.

最近チェックした商品