Security and Privacy in Cyber-Physical Systems and Smart Vehicles (eBook, PDF)
Second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024, Proceedings
Redaktion: Hei, Xiali; Kim, Kyungtae; Kim, Taegyu; Garcia, Luis
48,95 €
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
48,95 €
Als Download kaufen
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
48,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Security and Privacy in Cyber-Physical Systems and Smart Vehicles (eBook, PDF)
Second EAI International Conference, SmartSP 2024, New Orleans, LA, USA, November 7-8, 2024, Proceedings
Redaktion: Hei, Xiali; Kim, Kyungtae; Kim, Taegyu; Garcia, Luis
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7-8, 2024.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 36.23MB
Andere Kunden interessierten sich auch für
- Security and Privacy in Cyber-Physical Systems and Smart Vehicles (eBook, PDF)53,95 €
- Smart Cities, Green Technologies, and Intelligent Transport Systems (eBook, PDF)53,95 €
- Smart Cities, Green Technologies, and Intelligent Transport Systems (eBook, PDF)65,95 €
- Research and the Future of Telematics (eBook, PDF)40,95 €
- Mobile Web and Intelligent Information Systems (eBook, PDF)40,95 €
- Privacy Technologies and Policy (eBook, PDF)40,95 €
- Smart Cities, Green Technologies and Intelligent Transport Systems (eBook, PDF)40,95 €
-
-
-
This book LNICST 622 constitutes the refereed proceedings of the Second EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, SmartSP 2024, held in New Orleans, LA, USA, during November 7-8, 2024.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems.
The 18 full papers were carefully reviewed an selected from 47 submissions. The proceedings focus on Emerging Applications, Hardware and Firmware Security, Adversarial Attacks in Autonomous Systems, Ethics, Privacy, Human-Centric Considerations and Security Techniques for Cyber-Physical Systems.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 368
- Erscheinungstermin: 26. Juni 2025
- Englisch
- ISBN-13: 9783031933547
- Artikelnr.: 74738249
- Verlag: Springer International Publishing
- Seitenzahl: 368
- Erscheinungstermin: 26. Juni 2025
- Englisch
- ISBN-13: 9783031933547
- Artikelnr.: 74738249
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Emerging Applications.- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics.- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing.- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer.- Security Techniques for Cyber-Physical Systems.- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots.- Software Bill of Materials Management for Embedded Vehicle Systems.- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement.- A Case Study of API Design for Interoperability and Security of the Internet of Things.- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments.- Hardware and Firmware Security.- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair.- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network.- RustBound: Function Boundary Detection over Rust Stripped Binaries.- Adversarial Attacks in Autonomous Systems.- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study.- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles.- Ethics, Privacy, and Human-Centric Considerations.- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Privacy-Enrooted Car Systems (PECS): Preliminary Design.- Demos.- Demo: All-in-One Solution for Online Abuse Research.
Emerging Applications.- Leaking Through the Physics: Covert Cyber-Physical Data Exfiltration Through Unobserved Physics.- AcousticScope: Understanding Biases in Voice Interaction via Automated Acoustic Testing.- Practitioner Paper: Decoding Intellectual Property: Acoustic and Magnetic Side-channel Attack on a 3D Printer.- Security Techniques for Cyber-Physical Systems.- An efficient and applicable physical fingerprinting framework for the controller area network utilizing deep learning algorithm trained on recurrence plots.- Software Bill of Materials Management for Embedded Vehicle Systems.- ProvPredictor: Utilizing Provenance Information for Real-Time IoT Policy Enforcement.- A Case Study of API Design for Interoperability and Security of the Internet of Things.- ShadowConn: Breaking the Entanglement of Cross-platform IoT Delegation in Multi-user Environments.- Hardware and Firmware Security.- Hardware-assisted Runtime In-vehicle ECU Firmware Self-attestation and Self-repair.- Unveiling the Operation and Configuration of a Real-World Bulk Substation Network.- RustBound: Function Boundary Detection over Rust Stripped Binaries.- Adversarial Attacks in Autonomous Systems.- Transient Adversarial 3D Projection Attacks on Object Detection in Autonomous Driving.- Assessing Deep Learning Model Accuracy in Varied Surface Conditions for CPS: A Comparative Study.- Practitioner Paper: A Real-Time Defense Against Object Vanishing Adversarial Patch Attacks for Object Detection in Autonomous Vehicles.- Ethics, Privacy, and Human-Centric Considerations.- Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.- Integrating Human Preferences for Moral Decision Making in Autonomous Vehicles.- Privacy-Enrooted Car Systems (PECS): Preliminary Design.- Demos.- Demo: All-in-One Solution for Online Abuse Research.