Information and Communications Security
Information and Communications Security
26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I
Kalloniatis, Christos; Katsikas, Sokratis; Xenakis, Christos; Lambrinoudakis, Costas
Springer Verlag, Singapore
01/2025
319
Mole
9789819787975
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- How to Design Honey Vault Schemes.
.- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time.
.- Improving Differential-Neural Cryptanalysis for Large-State SPECK.
.- Evasion attempt for the malicious PowerShell detector considering feature weights.
.- A Fast Framework for Efficiently Constructing Valuable Cubes.
.- A Survey on Acoustic Side Channel Attacks on Keyboards.
.- Trust.
.- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics.
.- DMA: Mutual Attestation Framework for Distributed Enclaves.
.- Cabin: Confining Untrusted Programs within Confidential VM.
.- Anomaly detection.
.- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering.
.- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection.
.- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection.
.- Privacy.
.- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource.
.- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption.
.- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems.
.- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments.
.- How to Design Honey Vault Schemes.
.- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time.
.- Improving Differential-Neural Cryptanalysis for Large-State SPECK.
.- Evasion attempt for the malicious PowerShell detector considering feature weights.
.- A Fast Framework for Efficiently Constructing Valuable Cubes.
.- A Survey on Acoustic Side Channel Attacks on Keyboards.
.- Trust.
.- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics.
.- DMA: Mutual Attestation Framework for Distributed Enclaves.
.- Cabin: Confining Untrusted Programs within Confidential VM.
.- Anomaly detection.
.- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering.
.- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection.
.- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection.
.- Privacy.
.- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource.
.- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption.
.- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems.
.- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments.