Information Security Applications

Information Security Applications portes grátis

Information Security Applications

26th International Conference, WISA 2025, Jeju Island, South Korea, August 20-22, 2025, Revised Selected Papers

Park, Ki-Woong; Park, Jungsoo

Springer Verlag, Singapore

03/2026

Mole

Inglês

9789819568567

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- System & Application Security

.- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV.
.- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes.
.- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection.

.- 5G & Network Security

.- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems.
.- Toward a Stealth Mode of 5G-AKA.

.- Cybersecurity Education & Model Security

.- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance.
.- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source.

.- Security Analysis & Verification

.- Impossible Differential Attack on SAND-64.
.- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger.
.- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs.

.- Malware & Forensics

.- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations.
.- Interaction-Aware System Call Sequence Analysis for Android Malware Classification.

.- Quantum & Cryptography

.- Depth-Optimized Quantum Implementation of CHAM.
.- Quantum Implementation and Analysis of SHA-1.
.- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions.

.- AI/LLM for Security

.- Detecting Malicious JavaScript Code by Code-Specialized LLM.
.- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models.
.- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework.

.- Privacy & Anonymity

.- Towards Sender Anonymity for Singleton Sets.
.- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models.
.- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach.

.- IoT & Traffic Analysis

.- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries.
.- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures.
.- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Analysis of network and security protocols;Anonymity and censorship-resistant technologies;Applications of cryptographic techniques;Authentication and authorization;Automated tools for source code/binary analysis;Automobile security;AI security;Botnet defense;Blockchain security;Critical infrastructure security;Denial-of-service attacks and countermeasures;Digital Forensics;Embedded systems security;Exploit techniques and automation;Hardware and physical security;HCI security and privacy