Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings: Lecture Notes in Computer Science, cartea 14901
Editat de Anna Lisa Ferrara, Ram Krishnanen Limba Engleză Paperback – 13 iul 2024
The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 449.57 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 18% Preț: 938.83 lei
- 20% Preț: 591.51 lei
- 15% Preț: 438.59 lei
- 20% Preț: 337.00 lei
- Preț: 389.48 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- 20% Preț: 649.49 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 438.59 lei
Preț vechi: 515.98 lei
-15% Nou
Puncte Express: 658
Preț estimativ în valută:
83.92€ • 87.86$ • 69.44£
83.92€ • 87.86$ • 69.44£
Carte tipărită la comandă
Livrare economică 07-21 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031651717
ISBN-10: 3031651715
Ilustrații: XV, 342 p. 100 illus., 77 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031651715
Ilustrații: XV, 342 p. 100 illus., 77 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
.- Access Control.
.- A Graph-based Framework for ABAC Policy Enforcement and Analysis.
.- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation.
.- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence.
.- Crypto Application.
.- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.
.- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing.
.- Towards Atomicity and Composability in Cross-Chain NFTs.
.- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.
.- Privacy.
.- DT-Anon: Decision Tree Target-Driven Anonymization.
.- Visor: Privacy-preserving Reputation for Decentralized Marketplaces.
.- Attack.
.- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods.
.- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024.
.- Optimal Automated Generation of Playbooks.
.- ML Attack, Vulnerablity.
.- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.
.- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning.
.- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset.
.- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping.
.- Security User Studies.
.- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics.
.- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users.
.- Differential Privacy.
.- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains.
.- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
.- A Graph-based Framework for ABAC Policy Enforcement and Analysis.
.- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation.
.- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence.
.- Crypto Application.
.- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.
.- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing.
.- Towards Atomicity and Composability in Cross-Chain NFTs.
.- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.
.- Privacy.
.- DT-Anon: Decision Tree Target-Driven Anonymization.
.- Visor: Privacy-preserving Reputation for Decentralized Marketplaces.
.- Attack.
.- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods.
.- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024.
.- Optimal Automated Generation of Playbooks.
.- ML Attack, Vulnerablity.
.- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.
.- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning.
.- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset.
.- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping.
.- Security User Studies.
.- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics.
.- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users.
.- Differential Privacy.
.- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains.
.- Does Differential Privacy Prevent Backdoor Attacks in Practice?.