Information and Communications Security

Information and Communications Security

26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I

Kalloniatis, Christos; Katsikas, Sokratis; Xenakis, Christos; Lambrinoudakis, Costas

Springer Verlag, Singapore

01/2025

319

Mole

9789819787975

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Attacks.



.- How to Design Honey Vault Schemes.



.- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time.



.- Improving Differential-Neural Cryptanalysis for Large-State SPECK.



.- Evasion attempt for the malicious PowerShell detector considering feature weights.



.- A Fast Framework for Efficiently Constructing Valuable Cubes.



.- A Survey on Acoustic Side Channel Attacks on Keyboards.



.- Trust.



.- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics.



.- DMA: Mutual Attestation Framework for Distributed Enclaves.



.- Cabin: Confining Untrusted Programs within Confidential VM.



.- Anomaly detection.



.- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering.



.- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection.



.- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection.



.- Privacy.



.- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource.



.- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption.



.- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems.



.- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments.
Information security;communications security;cybersecurity;privacy;applied cryptography;cybercrime;mobile security and privacy;critical infrastructure protection;cyber physical systems security;cyber resilience;cyber threat intelligence;digital forensics;formal methods for security;trust management and reputation;web security and privacy