ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers

Author:   Norbert Meyer ,  Anna Grocholewska-Czuryło
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2024
Volume:   679
ISBN:  

9783031563256


Pages:   378
Publication Date:   24 April 2024
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Norbert Meyer ,  Anna Grocholewska-Czuryło
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2024
Volume:   679
ISBN:  

9783031563256


ISBN 10:   3031563255
Pages:   378
Publication Date:   24 April 2024
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List