Risks and Security of Internet and Systems
19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings
Herausgegeben:Collart-Dutilleul, Simon; Ouchani, Samir; Cuppens, Nora; Cuppens, Frédéric
Risks and Security of Internet and Systems
19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings
Herausgegeben:Collart-Dutilleul, Simon; Ouchani, Samir; Cuppens, Nora; Cuppens, Frédéric
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024.
The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment. …mehr
Andere Kunden interessierten sich auch für
- Risks and Security of Internet and Systems49,99 €
- Risks and Security of Internet and Systems38,99 €
- Financial Cryptography and Data Security38,99 €
- Risks and Security of Internet and Systems90,99 €
- Risks and Security of Internet and Systems41,99 €
- Risks and Security of Internet and Systems38,99 €
- Florian MairAssessment of Data Integrity Risks in Public Blockchain Systems47,95 €
-
-
-
This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024.
The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.
The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 15456
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-89349-0
- Seitenzahl: 580
- Erscheinungstermin: 26. April 2025
- Englisch
- Abmessung: 235mm x 155mm x 32mm
- Gewicht: 867g
- ISBN-13: 9783031893490
- ISBN-10: 3031893492
- Artikelnr.: 73489592
- Herstellerkennzeichnung
- Springer-Verlag KG
- Sachsenplatz 4-6
- 1201 Wien, AT
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 15456
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-89349-0
- Seitenzahl: 580
- Erscheinungstermin: 26. April 2025
- Englisch
- Abmessung: 235mm x 155mm x 32mm
- Gewicht: 867g
- ISBN-13: 9783031893490
- ISBN-10: 3031893492
- Artikelnr.: 73489592
- Herstellerkennzeichnung
- Springer-Verlag KG
- Sachsenplatz 4-6
- 1201 Wien, AT
- ProductSafety@springernature.com
.- Abstracts of Invited Talks.
.- Horizontal Attack from Theory to Practice.
.- Security for Safety Critical Systems in the Railways.
.- Security Network Protocols.
.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.
.- Card-Based Secure Evaluation of Decision Trees.
.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.
.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.
.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.
.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.
.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.
.- AI-Driven Threat Detection.
.- On the Properness of Large Language Models for Malware Detection.
.- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing.
.- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence.
.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.
.- Information Security Management.
.- ECU-KM : An E cient Key Management for In-Vehicle Networks.
.- Injecting Bias into Text Classification Models Using Backdoor Attacks.
.- Towards New Models of Information Sharing.
.- Distributed and Verifiable Digital Badges.
.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.
.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.
.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.
.- Applied Cryptography & Privacy.
.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.
.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.
.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.
.- Threats Detection & Protection.
.- Preventing WebRTC IP Address Leaks.
.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.
.- Device Fingerprinting Remediation in Android and iOS Apps.
.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.
.- Risk Identification & Management.
.- A Safety Kernel for Flexible Level Crossing Management.
.- E cient Identification of UAVs Through Automatic Communication Frame Linking.
.- Enterprise Risk Management in SMEs : Insights from West Africa.
.- Blockchain & Distributed Ledger Security.
.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.
.- Modeling and Assessing Coercion Threats in Electronic Voting.
.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.
.- AI for Security Assessment.
.- Automated Assessment of the Exploits Using Deep Learning Methods.
.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O .
.- Relevance of Image-Based Representation for Android Malware Detection.
.- Horizontal Attack from Theory to Practice.
.- Security for Safety Critical Systems in the Railways.
.- Security Network Protocols.
.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.
.- Card-Based Secure Evaluation of Decision Trees.
.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.
.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.
.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.
.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.
.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.
.- AI-Driven Threat Detection.
.- On the Properness of Large Language Models for Malware Detection.
.- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing.
.- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence.
.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.
.- Information Security Management.
.- ECU-KM : An E cient Key Management for In-Vehicle Networks.
.- Injecting Bias into Text Classification Models Using Backdoor Attacks.
.- Towards New Models of Information Sharing.
.- Distributed and Verifiable Digital Badges.
.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.
.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.
.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.
.- Applied Cryptography & Privacy.
.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.
.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.
.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.
.- Threats Detection & Protection.
.- Preventing WebRTC IP Address Leaks.
.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.
.- Device Fingerprinting Remediation in Android and iOS Apps.
.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.
.- Risk Identification & Management.
.- A Safety Kernel for Flexible Level Crossing Management.
.- E cient Identification of UAVs Through Automatic Communication Frame Linking.
.- Enterprise Risk Management in SMEs : Insights from West Africa.
.- Blockchain & Distributed Ledger Security.
.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.
.- Modeling and Assessing Coercion Threats in Electronic Voting.
.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.
.- AI for Security Assessment.
.- Automated Assessment of the Exploits Using Deep Learning Methods.
.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O .
.- Relevance of Image-Based Representation for Android Malware Detection.
.- Abstracts of Invited Talks.
.- Horizontal Attack from Theory to Practice.
.- Security for Safety Critical Systems in the Railways.
.- Security Network Protocols.
.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.
.- Card-Based Secure Evaluation of Decision Trees.
.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.
.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.
.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.
.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.
.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.
.- AI-Driven Threat Detection.
.- On the Properness of Large Language Models for Malware Detection.
.- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing.
.- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence.
.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.
.- Information Security Management.
.- ECU-KM : An E cient Key Management for In-Vehicle Networks.
.- Injecting Bias into Text Classification Models Using Backdoor Attacks.
.- Towards New Models of Information Sharing.
.- Distributed and Verifiable Digital Badges.
.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.
.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.
.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.
.- Applied Cryptography & Privacy.
.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.
.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.
.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.
.- Threats Detection & Protection.
.- Preventing WebRTC IP Address Leaks.
.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.
.- Device Fingerprinting Remediation in Android and iOS Apps.
.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.
.- Risk Identification & Management.
.- A Safety Kernel for Flexible Level Crossing Management.
.- E cient Identification of UAVs Through Automatic Communication Frame Linking.
.- Enterprise Risk Management in SMEs : Insights from West Africa.
.- Blockchain & Distributed Ledger Security.
.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.
.- Modeling and Assessing Coercion Threats in Electronic Voting.
.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.
.- AI for Security Assessment.
.- Automated Assessment of the Exploits Using Deep Learning Methods.
.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O .
.- Relevance of Image-Based Representation for Android Malware Detection.
.- Horizontal Attack from Theory to Practice.
.- Security for Safety Critical Systems in the Railways.
.- Security Network Protocols.
.- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks.
.- Card-Based Secure Evaluation of Decision Trees.
.- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach.
.- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions.
.- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy.
.- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0.
.- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects.
.- AI-Driven Threat Detection.
.- On the Properness of Large Language Models for Malware Detection.
.- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing.
.- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence.
.- Automated Risk Assessment of Shell-Based Attacks Using a LLM.
.- Information Security Management.
.- ECU-KM : An E cient Key Management for In-Vehicle Networks.
.- Injecting Bias into Text Classification Models Using Backdoor Attacks.
.- Towards New Models of Information Sharing.
.- Distributed and Verifiable Digital Badges.
.- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design.
.- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach.
.- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities.
.- Applied Cryptography & Privacy.
.- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning.
.- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT.
.- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map.
.- Threats Detection & Protection.
.- Preventing WebRTC IP Address Leaks.
.- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning.
.- Device Fingerprinting Remediation in Android and iOS Apps.
.- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements.
.- Risk Identification & Management.
.- A Safety Kernel for Flexible Level Crossing Management.
.- E cient Identification of UAVs Through Automatic Communication Frame Linking.
.- Enterprise Risk Management in SMEs : Insights from West Africa.
.- Blockchain & Distributed Ledger Security.
.- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers.
.- Modeling and Assessing Coercion Threats in Electronic Voting.
.- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme.
.- AI for Security Assessment.
.- Automated Assessment of the Exploits Using Deep Learning Methods.
.- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O .
.- Relevance of Image-Based Representation for Android Malware Detection.