Availability, Reliability and Security (eBook, PDF)
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I Redaktion: Dalla Preda, Mila; de Sutter, Bjorn; Naessens, Vincent; Schrittwieser, Sebastian
Availability, Reliability and Security (eBook, PDF)
20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I Redaktion: Dalla Preda, Mila; de Sutter, Bjorn; Naessens, Vincent; Schrittwieser, Sebastian
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.…mehr
This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025. The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions. They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.- Prink: ks-Anonymization for Streaming Data in Apache Flink.- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences.- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles.- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection.- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks.- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks.- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model.- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.- Gradient Inversion of Federated Diffusion Models.- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.- BTDT: Membership Inference Attacks against Large Language Models.
Privacy-Enhancing Technologies and Legal Compliance: A Framework for Supporting PET Selection Based on GDPR Principles.- Prink: ks-Anonymization for Streaming Data in Apache Flink.- Stop watching me! Moving from data protection to privacy preservation in crowd monitoring.- Cross-Jurisdictional Compliance with Privacy Laws: How Websites Adapt Consent Notices to Regional Regulations. Network and Communication Security: On the Feasibility of Fingerprinting Collaborative Robot Network Traffic.- Domainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences.- Mitigation of PFCP Attacks in 5G Networks: Dynamic Defense through Moving Target Defense and Honeynets.- Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels.- Towards Deterministic DDS Communication for Secure Service-Oriented Software-Defined Vehicles.- TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting.- Generalized Encrypted Traffic Classification Using Inter-Flow Signals. IoT and Embedded Systems Securit: SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection.- AARC-FE: Electrical Assembly Authentication with Random Convolution Kernels and Fuzzy Extractors.- In Specs we Trust? Conformance-Analysis of Implementation to Specifications in Node-RED and Associated Security Risks.- Scrambling Compiler: Automated and Unified Countermeasure for Profiled and Non-Profiled Side Channel Attacks.- Leaky Batteries: A Novel Set of Side-Channel Attacks on Electric Vehicles. Machine Learning and Privacy: DP-TLDM: Differentially Private Tabular Latent Diffusion Model.- Share Secrets for Privacy. Confidential Forecasting with Vertical Federated Learning.- Gradient Inversion of Federated Diffusion Models.- Privacy-Preserving Encoding and Scaling of Tabular Data in Horizontal Federated Learning Systems.- BTDT: Membership Inference Attacks against Large Language Models.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826