|
|
|||
|
||||
OverviewThis two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice of Security, FPS 2025, held in Brest, France during November 25–27, 2025. The 38 full and 8 short papers presented in this book were carefully reviewed and selected from 91 submissions. These papers were organized in the following topical sections: Part I: Security, Privacy, and Trust in Emerging Distributed Systems; Cyber Resilience and Risk Management in Enterprise Architectures; Formal Methods and Automated Analysis for Secure Software Systems; Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation; Applications to Industry and Critical Infrastructure. Part II: Advances in Privacy-Preserving Cryptography and Secure Computation; Secure and Intelligent Network Architectures for Next-Generation Communications; Secure, Explainable, and Efficient Machine Learning in Cybersecurity; Short Papers. Full Product DetailsAuthor: Ranwa Al-Mallah , Samiha Ayed , Frédéric Cuppens , Françoise SailhanPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032200174ISBN 10: 3032200172 Pages: 468 Publication Date: 16 May 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Security, Privacy, and Trust in Emerging Distributed Systems. .- Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&ck Graph And Multi-criteria Optimization. .- ForensicChain: Blockchain-based Secure Digital Forensic Investigations. .- Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks. .- Cyber Resilience and Risk Management in Enterprise Architectures. .- Eliciting metrics and evaluating cyber resilience of a capability in the context of a multilayer enterprise architecture. .- Predicting IoT Security Vulnerabilities from Device Specification. .- Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators. .- Optimizing Resilience in IT Architectures: A Multi-Objective Ontology-Based Approach. .- Formal Methods and Automated Analysis for Secure Software Systems. .- Vexed by VEXTools: Consistency Evaluation of Container Vulnerability Scanners. .- Towards a formal verification of the Bao Hypervisor. .- Finding Software Supply Chain Attack Paths with Logical Attack Graphs. .- From provable models to provable implementations: translating Alice & Bob security protocols to F*. .- Automatic Attack Script Generation: a MDA Approach. .- Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody. .- Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation. .- A Grammar-Driven Approach to Model and Detect APT Attack Sequences. .- Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation. .- Systematic Security Context Weighting for Trust Algorithms via AI/ML Model Performance Analysis. .- WildCode: An Empirical Analysis of Code Generated by ChatGPT. .- Binary and Multiclass Cyberattack Classification on GeNIS Dataset. .- Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models. .- Applications to Industry and Critical Infrastructure. .- An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity. .- Towards adoption of private distributed ledgers for capital markets. .- Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges. .- Secure-by-Design Architectures for Cooperative Intelligent Transport Systems: A Standards-Aligned Approach. .- Practical Evaluation of the Crypto-Agility Maturity Model.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||