Security and Privacy in Cyber-Physical Systems and Smart Vehicles
Second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024, Proceedings
Herausgegeben:Hei, Xiali; Garcia, Luis; Kim, Taegyu; Kim, Kyungtae
Security and Privacy in Cyber-Physical Systems and Smart Vehicles
Second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024, Proceedings
Herausgegeben:Hei, Xiali; Garcia, Luis; Kim, Taegyu; Kim, Kyungtae
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7 8, 2024.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.
Andere Kunden interessierten sich auch für
- Security and Privacy in Cyber-Physical Systems and Smart Vehicles49,99 €
- Intelligent Transport Systems, From Research and Development to the Market Uptake38,99 €
- Smart Cities, Green Technologies, and Intelligent Transport Systems49,99 €
- Smart Cities, Green Technologies, and Intelligent Transport Systems60,99 €
- Smart Objects and Technologies for Social Goods49,99 €
- Mobile Web and Intelligent Information Systems38,99 €
- Smart Technology38,99 €
-
-
-
This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7 8, 2024.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.
Produktdetails
- Produktdetails
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-93353-0
- Seitenzahl: 338
- Erscheinungstermin: Juli 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783031933530
- Artikelnr.: 73894071
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-93353-0
- Seitenzahl: 338
- Erscheinungstermin: Juli 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9783031933530
- Artikelnr.: 73894071
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Emerging Applications.- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics.- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing.- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer.- Security Techniques for Cyber-Physical Systems.- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots.- Short Paper: Software Bill of Materials Management for Embedded Vehicle Systems.- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement.- A Case Study of API Design for Interoperability and Security of the Internet of Things.- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments.- Hardware and Firmware Security.- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair.- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network.- RustBound: Function Boundary Detection over Rust Stripped Binaries.- Adversarial Attacks in Autonomous Systems.- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study.- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles.- Ethics, Privacy, and Human-Centric Considerations.- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Privacy-Enrooted Car Systems (PECS): Preliminary Design.- Demos.- Demo: All-in-One Solution for Online Abuse Research.This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7 8, 2024.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.
Emerging Applications.- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics.- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing.- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer.- Security Techniques for Cyber-Physical Systems.- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots.- Short Paper: Software Bill of Materials Management for Embedded Vehicle Systems.- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement.- A Case Study of API Design for Interoperability and Security of the Internet of Things.- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments.- Hardware and Firmware Security.- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair.- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network.- RustBound: Function Boundary Detection over Rust Stripped Binaries.- Adversarial Attacks in Autonomous Systems.- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study.- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles.- Ethics, Privacy, and Human-Centric Considerations.- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Privacy-Enrooted Car Systems (PECS): Preliminary Design.- Demos.- Demo: All-in-One Solution for Online Abuse Research.This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7 8, 2024.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, and Human-Centric Considerations.