ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection

38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Papers

Grocholewska-Czurylo, Anna; Meyer, Norbert

Springer International Publishing AG

04/2024

378

Dura

9783031563256

15 a 20 dias

Descrição não disponível.
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What's inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;Applied cryptography;Audit and risk analysis;authentication;Big data security and privacy;Cloud security and privacy;computer crime;computer networks;Critical infrastructure protection;Cyber-physical systems security;Data and applications security;data communication systems;data security;Digital forensics;Human aspects of security and privacy;Identity management;Information security education;network security;privacy;signal processing