Availability, Reliability and Security
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I
Herausgeber: Dalla Preda, Mila; Naessens, Vincent; Schrittwieser, Sebastian
Availability, Reliability and Security
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I
Herausgeber: Dalla Preda, Mila; Naessens, Vincent; Schrittwieser, Sebastian
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.…mehr
Andere Kunden interessierten sich auch für
- Andrew HoogiPhone and IOS Forensics64,99 €
- Pierre-Luc PomerleauEvidence-Based Cybersecurity56,99 €
- Trust, Security and Privacy for Big Data64,99 €
- Wisec13 Conference CommitteeWiSEC 13 Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks60,99 €
- Wisec 12 Conference CommitteeWiSec 12 Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks55,99 €
- Codaspy'11 Conference CommitteeCODASPY 11 Proceedings of the First ACM Conference on Data and Application Security & Privacy76,99 €
- Codaspy 15 Conference CommitteeCODASPY 15 Fifth ACM Conference on Data and Application Security and Privacy91,99 €
-
-
-
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing AG / Springer-Verlag GmbH
- Artikelnr. des Verlages: 89547946
- Seitenzahl: 424
- Erscheinungstermin: 2. September 2025
- Englisch
- ISBN-13: 9783032006233
- ISBN-10: 3032006236
- Artikelnr.: 74730129
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Verlag: Springer International Publishing AG / Springer-Verlag GmbH
- Artikelnr. des Verlages: 89547946
- Seitenzahl: 424
- Erscheinungstermin: 2. September 2025
- Englisch
- ISBN-13: 9783032006233
- ISBN-10: 3032006236
- Artikelnr.: 74730129
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
Privacy
Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.
Prink: ks
Anonymization for Streaming Data in Apache Flink.
Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.
Cross
Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.
Domainator: Detecting and Identifying DNS
Tunneling Malware Using Metadata Sequences.
Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.
Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.
Towards Deterministic DDS Communication for Secure Service
Oriented Software
Defined Vehicles.
TSA
WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.
Generalized Encrypted Traffic Classification Using Inter
Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML
Based 5G Jamming Detection.
AARC
FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.
In Specs we Trust? Conformance
Analysis of Implementation to Specifications in Node
RED and Associated Security Risks.
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non
Profiled Side Channel Attacks.
Leaky Batteries: A Novel Set of Side
Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP
TLDM: Differentially Private Tabular Latent Diffusion Model.
Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.
Gradient Inversion of Federated Diffusion Models.
Privacy
Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.
BTDT: Membership Inference Attacks against Large Language Models.
Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.
Prink: ks
Anonymization for Streaming Data in Apache Flink.
Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.
Cross
Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.
Domainator: Detecting and Identifying DNS
Tunneling Malware Using Metadata Sequences.
Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.
Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.
Towards Deterministic DDS Communication for Secure Service
Oriented Software
Defined Vehicles.
TSA
WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.
Generalized Encrypted Traffic Classification Using Inter
Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML
Based 5G Jamming Detection.
AARC
FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.
In Specs we Trust? Conformance
Analysis of Implementation to Specifications in Node
RED and Associated Security Risks.
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non
Profiled Side Channel Attacks.
Leaky Batteries: A Novel Set of Side
Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP
TLDM: Differentially Private Tabular Latent Diffusion Model.
Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.
Gradient Inversion of Federated Diffusion Models.
Privacy
Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.
BTDT: Membership Inference Attacks against Large Language Models.
Privacy
Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.
Prink: ks
Anonymization for Streaming Data in Apache Flink.
Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.
Cross
Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.
Domainator: Detecting and Identifying DNS
Tunneling Malware Using Metadata Sequences.
Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.
Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.
Towards Deterministic DDS Communication for Secure Service
Oriented Software
Defined Vehicles.
TSA
WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.
Generalized Encrypted Traffic Classification Using Inter
Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML
Based 5G Jamming Detection.
AARC
FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.
In Specs we Trust? Conformance
Analysis of Implementation to Specifications in Node
RED and Associated Security Risks.
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non
Profiled Side Channel Attacks.
Leaky Batteries: A Novel Set of Side
Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP
TLDM: Differentially Private Tabular Latent Diffusion Model.
Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.
Gradient Inversion of Federated Diffusion Models.
Privacy
Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.
BTDT: Membership Inference Attacks against Large Language Models.
Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.
Prink: ks
Anonymization for Streaming Data in Apache Flink.
Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.
Cross
Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.
Domainator: Detecting and Identifying DNS
Tunneling Malware Using Metadata Sequences.
Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.
Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.
Towards Deterministic DDS Communication for Secure Service
Oriented Software
Defined Vehicles.
TSA
WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.
Generalized Encrypted Traffic Classification Using Inter
Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML
Based 5G Jamming Detection.
AARC
FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.
In Specs we Trust? Conformance
Analysis of Implementation to Specifications in Node
RED and Associated Security Risks.
Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non
Profiled Side Channel Attacks.
Leaky Batteries: A Novel Set of Side
Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP
TLDM: Differentially Private Tabular Latent Diffusion Model.
Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.
Gradient Inversion of Federated Diffusion Models.
Privacy
Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.
BTDT: Membership Inference Attacks against Large Language Models.