Information Security Applications : 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Information Security Applications : 25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 340 p.
  • 言語 ENG
  • 商品コード 9789819616237

Full Description

This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024.

The 28 full papers included in this book were carefully reviewed and selected from 87 submissions. They were organized in topical sections as follows: Cryptography; Network Security; AI Security 1; Network & Application Security; AI Security 2; CPS Security; Fuzzing; Malware; Software Security; and Emerging Topic.

Contents

.- Cryptography.

.- ECPM Cryptanalysis Resource Estimation.

.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.

.- Network Security.

.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.

.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.

.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.

.- AI Security 1.

.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.

.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.

.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.

.- Network & Application Security.

.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.

.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.

.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.

.- AI Security 2.

.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.

.- An effective ensemble algorithm for short-term load forecasting.

.- CPS Security.

.- PUF-Based Authentication and Authorization Protocol for IoT.

.- Field Testing and Detection of Camera Interference for Autonomous Driving

.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.

.- Fuzzing.

.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.

.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.

.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.

.- Malware.

.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.

.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.

.- A Survey on Attack Cases with VBS Malware in Windows.

.- Software Security.

.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.

.- Plotting OSS-based Supply Chain attack strategies and the defense failure.

.- A Proposal of a Supply Chain Security Model for Generative AI.

.- Emerging Topic.

.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.

.- Quantum Implementation of LSH.

.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.

最近チェックした商品