|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Leonardo Horn Iwaya , Liina Kamm , Leonardo Martucci , Tobias PullsPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Volume: 15396 ISBN: 9783031790065ISBN 10: 3031790065 Pages: 502 Publication Date: 29 January 2025 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of Contents.- Authentication. .- Are Swedish Passwords Tougher Than the Rest?. .- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. .- Cryptography. .- Determining the A5 encryption algorithms used in 2G (GSM) networks. .- Misbinding Raw Public Keys to Identities in TLS. .- Small Private Exponent Attacks on Takagi Family Schemes. .- Cyber-Physical Systems. .- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. .- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. .- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. .- Cybersecurity and Policy. .- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. .- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. .- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. .- LLMs for Security. .- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. .- How to Train Your Llama – Efficient Grammar-Based Application Fuzzing Using Large Language Models. .- The Dual-Edged Sword of Large Language Models in Phishing. .- Formal Verification. .- Analysing TLS Implementations using Full-Message Symbolic Execution. .- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. .- Mobile & IoT. .- Beware of the Rabbit Hole – A Digital Forensic Case Study of DIY Drones. .- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. .- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. .- Network Security. .- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. .- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. .- Formally Discovering and Reproducing Network Protocols Vulnerabilities. .- Privacy. .- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. .- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. .- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||