Security and Privacy in Communication Networks
20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III
Herausgegeben:Alrabaee, Saed; Choo, Kim-Kwang Raymond; Damiani, Ernesto; Deng, Robert H.
Security and Privacy in Communication Networks
20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III
Herausgegeben:Alrabaee, Saed; Choo, Kim-Kwang Raymond; Damiani, Ernesto; Deng, Robert H.
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on
Privacy and Cryptography
AI for cybersecurity and Adversial models
Quantum Computing in Cybersecurity
Network Security
Blockchain and Cryptocurrencies
Fuzzing and IoT security
Malware and Attack Analysis
Web…mehr
Andere Kunden interessierten sich auch für
- Security and Privacy in Communication Networks67,99 €
- Security and Privacy in Communication Networks67,99 €
- Science of Cyber Security55,99 €
- Information Security Applications38,99 €
- Information Security Applications38,99 €
- Secure IT Systems56,99 €
- Machine Learning for Cyber Security90,99 €
-
-
-
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on
Privacy and Cryptography
AI for cybersecurity and Adversial models
Quantum Computing in Cybersecurity
Network Security
Blockchain and Cryptocurrencies
Fuzzing and IoT security
Malware and Attack Analysis
Web Security
Authentication
Large Language Model for Cybersecurity
Security Assessments
The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on
Privacy and Cryptography
AI for cybersecurity and Adversial models
Quantum Computing in Cybersecurity
Network Security
Blockchain and Cryptocurrencies
Fuzzing and IoT security
Malware and Attack Analysis
Web Security
Authentication
Large Language Model for Cybersecurity
Security Assessments
Produktdetails
- Produktdetails
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-94454-3
- Seitenzahl: 482
- Erscheinungstermin: 21. August 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783031944543
- Artikelnr.: 73950906
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-94454-3
- Seitenzahl: 482
- Erscheinungstermin: 21. August 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783031944543
- Artikelnr.: 73950906
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Fuzzing and IoT security.- Fast Firmware Fuzz with Input/Output Reposition.- ChipFuzzer: Towards Fuzzing Matter based IoT Devices for Vulnerability Detection.- Reusablity Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity.- Multi Server Publicly Verifiable Computation of polynomials.- Siamese Neural Network for Robust IoT Device Type Identification: A Few Shot Learning Approach.- FISFuzzer: A Grey Box Protocol Fuzzer Based on Field Inference and Scheduling.- Malware and Attack Analysis.- Mal POBM: A Genetic Algorithm for Malware Adversarial Sample Generation.- Graphite: Real Time Graph Based Detection of Windows Fileless Malware Attacks.- Robust Network Intrusion Detection via Semi-Supervised Deep Reinforcement Learning.- BinSimDB: Benchmark Dataset Construction for Fine Grained Binary Code Similarity Analysis.- OnionPeeler: A Novel Input Enriched Website Fingerprinting Attack on Tor Onion Services.- Web Security.- Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real Time Smart Contract Analysis.- Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts.-ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection.- EasyCSPeasy: A Server side and Language agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP.- Encoder based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection.- Bag of Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security.- AutoS2ploit: From Automotive Safety Critical Functionalities to Security Exploit.- Pitfalls of data masking techniques: Re-identification attacks.- Faster Three Party Constant round Comparison with Application in Neural Network Inference.- WtLDP:Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy.- Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification.
Fuzzing and IoT security.- Fast Firmware Fuzz with Input/Output Reposition.- ChipFuzzer: Towards Fuzzing Matter based IoT Devices for Vulnerability Detection.- Reusablity Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity.- Multi Server Publicly Verifiable Computation of polynomials.- Siamese Neural Network for Robust IoT Device Type Identification: A Few Shot Learning Approach.- FISFuzzer: A Grey Box Protocol Fuzzer Based on Field Inference and Scheduling.- Malware and Attack Analysis.- Mal POBM: A Genetic Algorithm for Malware Adversarial Sample Generation.- Graphite: Real Time Graph Based Detection of Windows Fileless Malware Attacks.- Robust Network Intrusion Detection via Semi-Supervised Deep Reinforcement Learning.- BinSimDB: Benchmark Dataset Construction for Fine Grained Binary Code Similarity Analysis.- OnionPeeler: A Novel Input Enriched Website Fingerprinting Attack on Tor Onion Services.- Web Security.- Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real Time Smart Contract Analysis.- Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts.-ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection.- EasyCSPeasy: A Server side and Language agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP.- Encoder based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection.- Bag of Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security.- AutoS2ploit: From Automotive Safety Critical Functionalities to Security Exploit.- Pitfalls of data masking techniques: Re-identification attacks.- Faster Three Party Constant round Comparison with Application in Neural Network Inference.- WtLDP:Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy.- Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification.