Risks and Security of Internet and Systems: 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings

Author:   Simon Collart-Dutilleul ,  Samir Ouchani ,  Nora Cuppens ,  Frédéric Cuppens
Publisher:   Springer International Publishing AG
Volume:   15456
ISBN:  

9783031893490


Pages:   560
Publication Date:   26 April 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $284.60 Quantity:  
Add to Cart

Share |

Risks and Security of Internet and Systems: 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings


Overview

Full Product Details

Author:   Simon Collart-Dutilleul ,  Samir Ouchani ,  Nora Cuppens ,  Frédéric Cuppens
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15456
ISBN:  

9783031893490


ISBN 10:   3031893492
Pages:   560
Publication Date:   26 April 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

.- Abstracts of Invited Talks. .- Horizontal Attack from Theory to Practice. .- Security for Safety Critical Systems in the Railways. .- Security Network Protocols. .- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks. .- Card-Based Secure Evaluation of Decision Trees. .- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach. .- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions. .- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy. .- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0. .- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects. .- AI-Driven Threat Detection. .- On the Properness of Large Language Models for Malware Detection. .- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing. .- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence. .- Automated Risk Assessment of Shell-Based Attacks Using a LLM. .- Information Security Management. .- ECU-KM : An Efficient Key Management for In-Vehicle Networks. .- Injecting Bias into Text Classification Models Using Backdoor Attacks. .- Towards New Models of Information Sharing. .- Distributed and Verifiable Digital Badges. .- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design. .- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach. .- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities. .- Applied Cryptography & Privacy. .- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning. .- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT. .- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map. .- Threats Detection & Protection. .- Preventing WebRTC IP Address Leaks. .- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. .- Device Fingerprinting Remediation in Android and iOS Apps. .- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements. .- Risk Identification & Management. .- A Safety Kernel for Flexible Level Crossing Management. .- Efficient Identification of UAVs Through Automatic Communication Frame Linking. .- Enterprise Risk Management in SMEs : Insights from West Africa. .- Blockchain & Distributed Ledger Security. .- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers. .- Modeling and Assessing Coercion Threats in Electronic Voting. .- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme. .- AI-Driven Threat Detection. .- Automated Assessment of the Exploits Using Deep Learning Methods. .- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-Off. .- Relevance of Image-Based Representation for Android Malware Detection.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

SEPRG2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List