Science of Cyber Security: 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14–16, 2024, Proceedings

Author:   Jun Zhao ,  Weizhi Meng
Publisher:   Springer Nature Switzerland AG
Volume:   15441
ISBN:  

9789819624164


Pages:   474
Publication Date:   04 March 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $168.16 Quantity:  
Add to Cart

Share |

Science of Cyber Security: 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14–16, 2024, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Jun Zhao ,  Weizhi Meng
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Volume:   15441
ISBN:  

9789819624164


ISBN 10:   9819624169
Pages:   474
Publication Date:   04 March 2025
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

.- A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. .- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. .- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. .- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. .- Completeness Analysis of Mobile Apps’ Privacy Policies by Using Deep Learning. .- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. .- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. .- Graph-Based Profiling of Dependency Vulnerability Remediation. .- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. .- An Enhanced Firewall for IoT Security. .- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. .- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. .- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. .- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. .- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. .- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. .- Smart Home Cyber Insurance Pricing. .- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. .- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. .- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. .- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. .- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. .- Integrating CP-ABE and Device Fingerprint into Federated Learning. .- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. .- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List