Foundations and Practice of Security: 18th International Symposium, FPS 2025, Brest, France, November 25–27, 2025, Revised Selected Papers, Part I

Author:   Ranwa Al-Mallah ,  Samiha Ayed ,  Frédéric Cuppens ,  Françoise Sailhan
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032200174


Pages:   468
Publication Date:   16 May 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $263.97 Quantity:  
Pre-Order

Share |

Foundations and Practice of Security: 18th International Symposium, FPS 2025, Brest, France, November 25–27, 2025, Revised Selected Papers, Part I


Overview

This two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice of Security, FPS 2025, held in Brest, France during November 25–27, 2025. The 38 full and 8 short papers presented in this book were carefully reviewed and selected from 91 submissions. These papers were organized in the following topical sections: Part I: Security, Privacy, and Trust in Emerging Distributed Systems; Cyber Resilience and Risk Management in Enterprise Architectures; Formal Methods and Automated Analysis for Secure Software Systems; Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation; Applications to Industry and Critical Infrastructure.   Part II: Advances in Privacy-Preserving Cryptography and Secure Computation; Secure and Intelligent Network Architectures for Next-Generation Communications; Secure, Explainable, and Efficient Machine Learning in Cybersecurity; Short Papers.

Full Product Details

Author:   Ranwa Al-Mallah ,  Samiha Ayed ,  Frédéric Cuppens ,  Françoise Sailhan
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032200174


ISBN 10:   3032200172
Pages:   468
Publication Date:   16 May 2026
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Security, Privacy, and Trust in Emerging Distributed Systems. .- Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&ck Graph And Multi-criteria Optimization. .- ForensicChain: Blockchain-based Secure Digital Forensic Investigations. .- Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks. .- Cyber Resilience and Risk Management in Enterprise Architectures. .- Eliciting metrics and evaluating cyber resilience of a capability in the context of a multilayer enterprise architecture. .- Predicting IoT Security Vulnerabilities from Device Specification. .- Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators. .- Optimizing Resilience in IT Architectures: A Multi-Objective Ontology-Based Approach. .- Formal Methods and Automated Analysis for Secure Software Systems. .- Vexed by VEXTools: Consistency Evaluation of Container Vulnerability Scanners. .- Towards a formal verification of the Bao Hypervisor. .- Finding Software Supply Chain Attack Paths with Logical Attack Graphs. .- From provable models to provable implementations: translating Alice & Bob security protocols to F*. .- Automatic Attack Script Generation: a MDA Approach. .- Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody. .- Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation. .- A Grammar-Driven Approach to Model and Detect APT Attack Sequences. .- Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation. .- Systematic Security Context Weighting for Trust Algorithms via AI/ML Model Performance Analysis. .- WildCode: An Empirical Analysis of Code Generated by ChatGPT. .- Binary and Multiclass Cyberattack Classification on GeNIS Dataset. .- Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models. .- Applications to Industry and Critical Infrastructure. .- An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity. .- Towards adoption of private distributed ledgers for capital markets. .- Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges. .- Secure-by-Design Architectures for Cooperative Intelligent Transport Systems: A Standards-Aligned Approach. .- Practical Evaluation of the Crypto-Agility Maturity Model.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

April RG 26_2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List