|
|
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 26th International Conference on Information Security Applications, WISA 2025, held in Jeju Island, South Korea, during August 20–22, 2025. The 26 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: System & Application Security, 5G & Network Security, Cybersecurity Education & Model Security, Security Analysis & Verification, Malware & Forensics, Quantum & Cryptography, AI/LLM for Security, Privacy & Anonymity and IoT & Traffic Analysis. Full Product DetailsAuthor: Ki-Woong Park , Jungsoo ParkPublisher: Springer Verlag, Singapore Imprint: Springer Verlag, Singapore ISBN: 9789819568567ISBN 10: 9819568560 Pages: 296 Publication Date: 30 May 2026 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- System & Application Security .- Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV. .- PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes. .- GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection. .- 5G & Network Security .- A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems. .- Toward a Stealth Mode of 5G-AKA. .- Cybersecurity Education & Model Security .- Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance. .- TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source. .- Security Analysis & Verification .- Impossible Differential Attack on SAND-64. .- Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger. .- Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs. .- Malware & Forensics .- User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations. .- Interaction-Aware System Call Sequence Analysis for Android Malware Classification. .- Quantum & Cryptography .- Depth-Optimized Quantum Implementation of CHAM. .- Quantum Implementation and Analysis of SHA-1. .- PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions. .- AI/LLM for Security .- Detecting Malicious JavaScript Code by Code-Specialized LLM. .- A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models. .- Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework. .- Privacy & Anonymity .- Towards Sender Anonymity for Singleton Sets. .- LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models. .- Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach. .- IoT & Traffic Analysis .- IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries. .- Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures. .- Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||