Information Security Applications

Information Security Applications

25th International Conference, WISA 2024, Jeju Island, South Korea, August 21-23, 2024, Revised Selected Papers

Emura, Keita; Lee, Jong-Hyouk; Lee, Sokjoon

Springer Nature Switzerland AG

01/2025

340

Mole

9789819616237

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Cryptography.

.- ECPM Cryptanalysis Resource Estimation.

.- Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC.

.- Network Security.

.- ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach.

.- Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints.

.- Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training.

.- AI Security 1.

.- VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators.

.- Unsupervised Contextual Anomalous Communication Detection Using VQ Tokeniza tion with Flow Data.

.- Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.

.- Network & Application Security.

.- Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing.

.- Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperi cal Analysis.

.- LM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.

.- AI Security 2.

.- ChatDEOB: An Effective Deobfuscation Method based on Large Language Model.

.- An effective ensemble algorithm for short-term load forecasting.

.- CPS Security.

.- PUF-Based Authentication and Authorization Protocol for IoT.

.- Field Testing and Detection of Camera Interference for Autonomous Driving

.- One-class Classification-based Position Falsification Detection System in C-ITS Communication Network.

.- Fuzzing.

.- Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection.

.- Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks.

.- Fuzzing JavaScript Engines with Diversified Mutation Strategies.

.- Malware.

.- Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis.

.- Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective.

.- A Survey on Attack Cases with VBS Malware in Windows.

.- Software Security.

.- Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Seg mentation Models with Patch Attack.

.- Plotting OSS-based Supply Chain attack strategies and the defense failure.

.- A Proposal of a Supply Chain Security Model for Generative AI.

.- Emerging Topic.

.- Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid.

.- Quantum Implementation of LSH.

.- Who ruins the game?: unveiling cheating users in the "Battlefield" game.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
information security;security application;network security;cryptography;authentication