Information Security Applications: 26th International Conference, WISA 2025, Jeju Island, South Korea, August 20–22, 2025, Revised Selected Papers

Author:   Ki-Woong Park ,  Jungsoo Park
Publisher:   Springer Verlag, Singapore
ISBN:  

9789819568567


Pages:   296
Publication Date:   30 May 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $168.16 Quantity:  
Pre-Order

Share |

Information Security Applications: 26th International Conference, WISA 2025, Jeju Island, South Korea, August 20–22, 2025, Revised Selected Papers


Overview

This book constitutes the refereed proceedings of the 26th International Conference on Information Security Applications, WISA 2025, held in Jeju Island, South Korea, during August 20–22, 2025. The 26 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: System & Application Security, 5G & Network Security, Cybersecurity Education & Model Security, Security Analysis & Verification, Malware & Forensics, Quantum & Cryptography, AI/LLM for Security, Privacy & Anonymity and IoT & Traffic Analysis.  

Full Product Details

Author:   Ki-Woong Park ,  Jungsoo Park
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
ISBN:  

9789819568567


ISBN 10:   9819568560
Pages:   296
Publication Date:   30 May 2026
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- System & Application Security    .- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV. .- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes. .- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection.   .-   5G & Network Security   .- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems. .- Toward a Stealth Mode of 5G-AKA.   .- Cybersecurity Education & Model Security   .- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance. .- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source.   .- Security Analysis & Verification   .- Impossible Differential Attack on SAND-64. .- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger. .- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs.   .- Malware & Forensics   .- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations. .- Interaction-Aware System Call Sequence Analysis for Android Malware Classification.   .- Quantum & Cryptography   .- Depth-Optimized Quantum Implementation of CHAM. .- Quantum Implementation and Analysis of SHA-1. .- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions.   .- AI/LLM for Security   .- Detecting Malicious JavaScript Code by Code-Specialized LLM. .- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models. .- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework.   .- Privacy & Anonymity   .- Towards Sender Anonymity for Singleton Sets. .- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models. .- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach.   .- IoT & Traffic Analysis   .- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries. .- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures. .- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

April RG 26_2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List