Dependable and Secure Computing
14th Latin-American Symposium, LADC 2025, Valparaíso, Chile, October 27-31, 2025, Proceedings
Herausgegeben:Rodrigues, Luiz Antonio; Oliveira, Rui
Versandkostenfrei innerhalb Deutschlands
53,99 €
inkl. MwSt.
Versandkostenfrei*
Erscheint vorauss. 20. Februar 2026
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
27 °P sammeln
Dependable and Secure Computing
14th Latin-American Symposium, LADC 2025, Valparaíso, Chile, October 27-31, 2025, Proceedings
Herausgegeben:Rodrigues, Luiz Antonio; Oliveira, Rui
- Broschiertes Buch
This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows:
Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track, and Student Forum. …mehr
Andere Kunden interessierten sich auch für
Delta-4: A Generic Architecture for Dependable Distributed Computing38,99 €
Distributed Computing for Emerging Smart Networks83,99 €
Autonomous Control for a Reliable Internet of Services83,99 €
Security and Cryptography68,99 €
Chandreyee ChowdhuryDesigning Dependable Mobile Computing Systems with Mobile Agents46,99 €
Industrial Networks and Intelligent Systems70,99 €
Software Technologies for Embedded and Ubiquitous Systems76,99 €-
-
-
This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows:
Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track, and Student Forum.
The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows:
Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track, and Student Forum.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2697
- Verlag: Springer, Berlin; Springer
- Artikelnr. des Verlages: 89570086
- Seitenzahl: 344
- Erscheinungstermin: 20. Februar 2026
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783032115386
- ISBN-10: 3032115388
- Artikelnr.: 75644372
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Communications in Computer and Information Science 2697
- Verlag: Springer, Berlin; Springer
- Artikelnr. des Verlages: 89570086
- Seitenzahl: 344
- Erscheinungstermin: 20. Februar 2026
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783032115386
- ISBN-10: 3032115388
- Artikelnr.: 75644372
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.
Security Foundations and Compliance. .
Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil. .
SPIRE
Based Remote Attestation for Secure VPN Access. .
Towards a Minimum Security Baseline for Cyber
Physical Systems through Security Standards Harmonization. .
Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment. .
AI for Security and Dependability. .
An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment. .
FlowMon: A Workflow
Driven Visual Tool for Automated Monitoring Script Generation. .
Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum
Based LLM Framework. .
Consensus, Cryptography, and Blockchain. .
A Blockchain
Based Architecture for Communication Between Spectrum Access Systems. .
Byzantine Consensus with Secure and Intrusion
Tolerant In
Network Ordering. .
Thetacrypt: A Distributed Service for Threshold Cryptography. .
Modeling and Dependability Evaluation. .
A Practical TLA+ Library for Designing and Verifying Distributed Systems. .
Long
Term Experimental Evaluation of Software Aging Effects in NoSQL Database. .
Advances in Dependable and Secure Computing (Best Paper Candidates). .
Addressing Cryptographic Overheads in Low
Latency File Systems through Ahead
of
Time Encryption. .
Evaluating eBPF as an Alternative to Virtual Machine Introspection for High
Interaction Honeypot Implementation. .
Source Code Vulnerability Detection and Interpretability with Language Models. .
Monitoring and Critical Infrastructures. .
Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach. .
Quantitative Availability Analysis of Fog
Edge Monitoring Architectures in Bus Rapid Transit Station. .
Industry Track. .
Malware Detection in Windows Operating Systems using AI and In
Memory Process Analysis. .
Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach. .
Student Forum. .
Improving Safety in Industry 4.0 using an IoT
Helmet. .
Forecasting
Oriented Management of Software
Defined Fabric Environments. .
Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies. .
Towards Hierarchical Byzantine Distributed Replication.
Security Foundations and Compliance. .
Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil. .
SPIRE
Based Remote Attestation for Secure VPN Access. .
Towards a Minimum Security Baseline for Cyber
Physical Systems through Security Standards Harmonization. .
Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment. .
AI for Security and Dependability. .
An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment. .
FlowMon: A Workflow
Driven Visual Tool for Automated Monitoring Script Generation. .
Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum
Based LLM Framework. .
Consensus, Cryptography, and Blockchain. .
A Blockchain
Based Architecture for Communication Between Spectrum Access Systems. .
Byzantine Consensus with Secure and Intrusion
Tolerant In
Network Ordering. .
Thetacrypt: A Distributed Service for Threshold Cryptography. .
Modeling and Dependability Evaluation. .
A Practical TLA+ Library for Designing and Verifying Distributed Systems. .
Long
Term Experimental Evaluation of Software Aging Effects in NoSQL Database. .
Advances in Dependable and Secure Computing (Best Paper Candidates). .
Addressing Cryptographic Overheads in Low
Latency File Systems through Ahead
of
Time Encryption. .
Evaluating eBPF as an Alternative to Virtual Machine Introspection for High
Interaction Honeypot Implementation. .
Source Code Vulnerability Detection and Interpretability with Language Models. .
Monitoring and Critical Infrastructures. .
Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach. .
Quantitative Availability Analysis of Fog
Edge Monitoring Architectures in Bus Rapid Transit Station. .
Industry Track. .
Malware Detection in Windows Operating Systems using AI and In
Memory Process Analysis. .
Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach. .
Student Forum. .
Improving Safety in Industry 4.0 using an IoT
Helmet. .
Forecasting
Oriented Management of Software
Defined Fabric Environments. .
Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies. .
Towards Hierarchical Byzantine Distributed Replication.
.
Security Foundations and Compliance. .
Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil. .
SPIRE
Based Remote Attestation for Secure VPN Access. .
Towards a Minimum Security Baseline for Cyber
Physical Systems through Security Standards Harmonization. .
Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment. .
AI for Security and Dependability. .
An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment. .
FlowMon: A Workflow
Driven Visual Tool for Automated Monitoring Script Generation. .
Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum
Based LLM Framework. .
Consensus, Cryptography, and Blockchain. .
A Blockchain
Based Architecture for Communication Between Spectrum Access Systems. .
Byzantine Consensus with Secure and Intrusion
Tolerant In
Network Ordering. .
Thetacrypt: A Distributed Service for Threshold Cryptography. .
Modeling and Dependability Evaluation. .
A Practical TLA+ Library for Designing and Verifying Distributed Systems. .
Long
Term Experimental Evaluation of Software Aging Effects in NoSQL Database. .
Advances in Dependable and Secure Computing (Best Paper Candidates). .
Addressing Cryptographic Overheads in Low
Latency File Systems through Ahead
of
Time Encryption. .
Evaluating eBPF as an Alternative to Virtual Machine Introspection for High
Interaction Honeypot Implementation. .
Source Code Vulnerability Detection and Interpretability with Language Models. .
Monitoring and Critical Infrastructures. .
Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach. .
Quantitative Availability Analysis of Fog
Edge Monitoring Architectures in Bus Rapid Transit Station. .
Industry Track. .
Malware Detection in Windows Operating Systems using AI and In
Memory Process Analysis. .
Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach. .
Student Forum. .
Improving Safety in Industry 4.0 using an IoT
Helmet. .
Forecasting
Oriented Management of Software
Defined Fabric Environments. .
Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies. .
Towards Hierarchical Byzantine Distributed Replication.
Security Foundations and Compliance. .
Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil. .
SPIRE
Based Remote Attestation for Secure VPN Access. .
Towards a Minimum Security Baseline for Cyber
Physical Systems through Security Standards Harmonization. .
Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment. .
AI for Security and Dependability. .
An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment. .
FlowMon: A Workflow
Driven Visual Tool for Automated Monitoring Script Generation. .
Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum
Based LLM Framework. .
Consensus, Cryptography, and Blockchain. .
A Blockchain
Based Architecture for Communication Between Spectrum Access Systems. .
Byzantine Consensus with Secure and Intrusion
Tolerant In
Network Ordering. .
Thetacrypt: A Distributed Service for Threshold Cryptography. .
Modeling and Dependability Evaluation. .
A Practical TLA+ Library for Designing and Verifying Distributed Systems. .
Long
Term Experimental Evaluation of Software Aging Effects in NoSQL Database. .
Advances in Dependable and Secure Computing (Best Paper Candidates). .
Addressing Cryptographic Overheads in Low
Latency File Systems through Ahead
of
Time Encryption. .
Evaluating eBPF as an Alternative to Virtual Machine Introspection for High
Interaction Honeypot Implementation. .
Source Code Vulnerability Detection and Interpretability with Language Models. .
Monitoring and Critical Infrastructures. .
Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach. .
Quantitative Availability Analysis of Fog
Edge Monitoring Architectures in Bus Rapid Transit Station. .
Industry Track. .
Malware Detection in Windows Operating Systems using AI and In
Memory Process Analysis. .
Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach. .
Student Forum. .
Improving Safety in Industry 4.0 using an IoT
Helmet. .
Forecasting
Oriented Management of Software
Defined Fabric Environments. .
Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies. .
Towards Hierarchical Byzantine Distributed Replication.







