Secure IT Systems
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings
Herausgegeben:Horn Iwaya, Leonardo; Kamm, Liina; Martucci, Leonardo; Pulls, Tobias
Secure IT Systems
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6-7, 2024 Proceedings
Herausgegeben:Horn Iwaya, Leonardo; Kamm, Liina; Martucci, Leonardo; Pulls, Tobias
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 6-7, 2024.
The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.
Andere Kunden interessierten sich auch für
- Secure IT Systems85,99 €
- Secure IT Systems58,99 €
- Theory of Cryptography50,99 €
- Advancements in Smart Computing and Information Security58,99 €
- Electronic Voting31,99 €
- Cyber Security, Cryptology, and Machine Learning77,99 €
- Secure Knowledge Management In The Artificial Intelligence Era69,54 €
-
-
-
This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 6-7, 2024.
The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.
The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 15396
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-79006-5
- Seitenzahl: 516
- Erscheinungstermin: 29. Januar 2025
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 774g
- ISBN-13: 9783031790065
- ISBN-10: 3031790065
- Artikelnr.: 72063166
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 15396
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-79006-5
- Seitenzahl: 516
- Erscheinungstermin: 29. Januar 2025
- Englisch
- Abmessung: 235mm x 155mm x 28mm
- Gewicht: 774g
- ISBN-13: 9783031790065
- ISBN-10: 3031790065
- Artikelnr.: 72063166
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Authentication.
.- Are Swedish Passwords Tougher Than the Rest?.
.- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling.
.- Cryptography.
.- Determining the A5 encryption algorithms used in 2G (GSM) networks.
.- Misbinding Raw Public Keys to Identities in TLS.
.- Small Private Exponent Attacks on Takagi Family Schemes.
.- Cyber-Physical Systems.
.- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks.
.- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform.
.- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study.
.- Cybersecurity and Policy.
.- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights.
.- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
.- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare.
.- LLMs for Security.
.- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates.
.- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models.
.- The Dual-Edged Sword of Large Language Models in Phishing.
.- Formal Verification.
.- Analysing TLS Implementations using Full-Message Symbolic Execution.
.- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors.
.- Mobile & IoT.
.- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones.
.- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker.
.- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study.
.- Network Security.
.- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.
.- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization.
.- Formally Discovering and Reproducing Network Protocols Vulnerabilities.
.- Privacy.
.- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm.
.- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies.
.- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
.- Are Swedish Passwords Tougher Than the Rest?.
.- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling.
.- Cryptography.
.- Determining the A5 encryption algorithms used in 2G (GSM) networks.
.- Misbinding Raw Public Keys to Identities in TLS.
.- Small Private Exponent Attacks on Takagi Family Schemes.
.- Cyber-Physical Systems.
.- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks.
.- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform.
.- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study.
.- Cybersecurity and Policy.
.- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights.
.- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
.- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare.
.- LLMs for Security.
.- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates.
.- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models.
.- The Dual-Edged Sword of Large Language Models in Phishing.
.- Formal Verification.
.- Analysing TLS Implementations using Full-Message Symbolic Execution.
.- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors.
.- Mobile & IoT.
.- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones.
.- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker.
.- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study.
.- Network Security.
.- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.
.- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization.
.- Formally Discovering and Reproducing Network Protocols Vulnerabilities.
.- Privacy.
.- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm.
.- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies.
.- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
.- Authentication.
.- Are Swedish Passwords Tougher Than the Rest?.
.- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling.
.- Cryptography.
.- Determining the A5 encryption algorithms used in 2G (GSM) networks.
.- Misbinding Raw Public Keys to Identities in TLS.
.- Small Private Exponent Attacks on Takagi Family Schemes.
.- Cyber-Physical Systems.
.- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks.
.- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform.
.- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study.
.- Cybersecurity and Policy.
.- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights.
.- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
.- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare.
.- LLMs for Security.
.- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates.
.- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models.
.- The Dual-Edged Sword of Large Language Models in Phishing.
.- Formal Verification.
.- Analysing TLS Implementations using Full-Message Symbolic Execution.
.- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors.
.- Mobile & IoT.
.- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones.
.- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker.
.- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study.
.- Network Security.
.- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.
.- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization.
.- Formally Discovering and Reproducing Network Protocols Vulnerabilities.
.- Privacy.
.- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm.
.- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies.
.- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
.- Are Swedish Passwords Tougher Than the Rest?.
.- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling.
.- Cryptography.
.- Determining the A5 encryption algorithms used in 2G (GSM) networks.
.- Misbinding Raw Public Keys to Identities in TLS.
.- Small Private Exponent Attacks on Takagi Family Schemes.
.- Cyber-Physical Systems.
.- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks.
.- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform.
.- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study.
.- Cybersecurity and Policy.
.- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights.
.- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
.- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare.
.- LLMs for Security.
.- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates.
.- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models.
.- The Dual-Edged Sword of Large Language Models in Phishing.
.- Formal Verification.
.- Analysing TLS Implementations using Full-Message Symbolic Execution.
.- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors.
.- Mobile & IoT.
.- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones.
.- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker.
.- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study.
.- Network Security.
.- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic.
.- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization.
.- Formally Discovering and Reproducing Network Protocols Vulnerabilities.
.- Privacy.
.- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm.
.- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies.
.- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.