Information Security Applications : 26th International Conference, WISA 2025, Jeju Island, South Korea, August 20-22, 2025, Revised Selected Papers (Lecture Notes in Computer Science)

個数:
  • 予約

Information Security Applications : 26th International Conference, WISA 2025, Jeju Island, South Korea, August 20-22, 2025, Revised Selected Papers (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9789819568567

Full Description

This book constitutes the refereed proceedings of the 26th International Conference on Information Security Applications, WISA 2025, held in Jeju Island, South Korea, during August 20-22, 2025.

The 26 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: System & Application Security, 5G & Network Security, Cybersecurity Education & Model Security, Security Analysis & Verification, Malware & Forensics, Quantum & Cryptography, AI/LLM for Security, Privacy & Anonymity and IoT & Traffic Analysis.

 

Contents

.- System & Application Security 
 
.- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV.
.- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes.
.- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection.
 
.-   5G & Network Security
 
.- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems.
.- Toward a Stealth Mode of 5G-AKA.
 
.- Cybersecurity Education & Model Security
 
.- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance.
.- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source.
 
.- Security Analysis & Verification
 
.- Impossible Differential Attack on SAND-64.
.- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger.
.- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs.
 
.- Malware & Forensics
 
.- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations.
.- Interaction-Aware System Call Sequence Analysis for Android Malware Classification.
 
.- Quantum & Cryptography
 
.- Depth-Optimized Quantum Implementation of CHAM.
.- Quantum Implementation and Analysis of SHA-1.
.- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions.
 
.- AI/LLM for Security
 
.- Detecting Malicious JavaScript Code by Code-Specialized LLM.
.- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models.
.- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework.
 
.- Privacy & Anonymity
 
.- Towards Sender Anonymity for Singleton Sets.
.- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models.
.- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach.
 
.- IoT & Traffic Analysis
 
.- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries.
.- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures.
.- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.

最近チェックした商品