Security and Management, Wireless Networks, Software Engineering Research and Practice (Communications in Computer and Information Science)

個数:
  • 予約

Security and Management, Wireless Networks, Software Engineering Research and Practice (Communications in Computer and Information Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9783032222077

Full Description

This book constitutes the proceedings of the 24th International Conference on Security and Management, SAM 2025, the 24th International Conference on Wireless Networks, ICWN 2025, and the 23rd International Conference on Software Engineering Research and Practice, SERP 2025. They were held as part of the 2025 World Congress in Computer Science, Computer Engineering, and Applied Computing, CSCE 2025, which took place in Las Vegas, NV, USA, during July 21-24, 2025.

The SAM 2025 Conference received a total of 186 submissions, of which 38 papers were accepted. The ICWN 2025 Conference received 33 submissions, of which 8 papers were accepted. The SERP 2025 Conference received 49 submissions, of which 8 papers were accepted. This volume includes 37 of the accepted papers from SAM 2025, ICWN 2025, and SERP 2025.

The papers were organized in topical sections as follows: Cybersecurity - Defensive and Offensive Strategies, and Related Issues; Privacy Preserving, Authentication, and Blockchain Methods and Applications; Security Management, Communication Infrastructures, and Applications; 24th International Conference on Wireless Networks, ICWN 2025; 23rd International Conference on Software Engineering Research and Practice, SERP 2025; and Poster Research Papers. 

Contents

.- SECTION:  CYBERSECURITY - DEFENSIVE AND OFFENSIVE STRATEGIES, AND RELATED ISSUES
.- The Human Factor in Cybersecurity: A Conceptual Model Integrating Cognitive Biases.
.- Competency-Based Cybersecurity Education: Developing Industry-Aligned Curriculum Modules.
.- Composing Cyberattacks: Sequential Composition with Communication.
.- AI-Driven Deepfakes: Exploring Exploitation Risks and Cybersecurity Responses.
.- Harnessing Machine Learning and Artificial Intelligence in Cyber Security: A Deep Dive into Threat Detection, Anomaly Detection, Intrusion Detection, and Malware Analysis.
.- Dynamic ARP Cache Poisoning Detection and Enhanced Prevention in Virtual Networks Using SDN and Real-Time Traffic Analysis with Scapy.
.- SECTION:  PRIVACY PRESERVING, AUTHENTICATION, AND BLOCKCHAIN METHODS AND APPLICATIONS
.- Bridging the Gap to Enhance Critical Infrastructure Security through Data Analytics and Public-Private Partnerships.
.- Rethinking Privacy Laws for Subscriptions: A Consumer Harm Perspective.
.- A Secure and Private Food Recommendation Framework Using Game-Theoretic Adversarial Learning.
.- 3Body Problem: Can it be used for Cryptographically Secure Pseudorandom Number Generator (CSPRNG)?.
.- CryptoKeys: Another Keyboard-Centric Approach to End-to-End Encryption.
.- NFC-PUF Three-pass Authentication for Supply Blockchains.
.- SECTION:  SECURITY MANAGEMENT, COMMUNICATION INFRASTRUCTURES, AND APPLICATIONS
.- Multi-Party Computation for IoT Environments: Evaluating Information Checking Protocol-Based Verifiable Secret Sharing Under Resource Constraints.
.- Formal Security Verification of Messaging Layer Security Protocol Using ProVerif.
.- Mitigating Ransomware and Data Breaches in Mobile Health Applications: An Encryption and Integrity-Based Approach.
.- Fraudulent Digital Fingerprint: Developing a Dynamic Scam Detection Tool Through Machine Learning and Network Analysis.
.- CMR Vulnerabilities and Enhancing Game Payment System Protocols.
.- Assessing the Impact of Access Control Policies on Data Accessibility in Distributed NoSQL Environments.
.- ACLR: A Stacked Deep Learning Approach for Botnet Detection Using Network Traffic Analysis.
.- Typosquatting Detection at Scale: A Review of DNS-Focused Approach to Domain Abuse.
.- A Comparative Analysis of Taint Analysis Tools: Enhancing Security Through Combined Static Analysis Approaches.
.- Experimental Evaluation of Security Attacks on Self-Driving Car Platforms.
.- A Study on Integrated Framework for Copyright Protection based on Multi-Signature in NFT.
.- Assessment and Examination of Electromagnetic Radiation at DVB-T Broadcast Sites of the Greek Public Broadcasting Corporation.
.- Designing a Biorobotic Wireless Sensor Paradigm for Soil and Crop Monitoring.
.- AODV-M: The AODV Modified with Link Quality Prediction for WSN.
.- Selection Criteria for Cost-Effective Network Technologies for Rapid Expansion of Telecommunication Services in Rural Areas of South Africa.
.- Hybrid Modulation Scheme for Reducing Peak to Average Power Ratio in 5G Based on Spatial CE-OFDMA Signal.
.- Automation Innovation - AI's Impact on Software Development Lifecycle.
.- An Empirical Study on the Evolution and Vulnerabilities of Maven Artifacts.
.- A Non-Functional Quality Framework for Blockchain Software: ISO/IEC 25010 Revisited.
.- Remaining Agile with Hybrid Work Models.
.- The Role of Provenance Modeling in Tracing and Reproducing Explainable AI Pipelines.
.- Best Practice of Scenario-Based Modeling for Humanoid Software Validation.
.- Cumulative Effort Estimation in an Evolving Legacy System.
.- The Use of ChatGPT to Teach Coding Inhibits Software Development or Supplements Coding Education.
.- SECTION:  POSTER RESEARCH PAPERS
.- Branch-Commit-Validate: A Git-Inspired Workflow for Autonomous Red-Team Agents.

最近チェックした商品