SALE ON NOW! PROMOTIONS

Close Notification

Your cart does not contain any items

Risks and Security of Internet and Systems

19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings...

Simon Collart-Dutilleul Samir Ouchani Nora Cuppens Frédéric Cuppens

$325.95   $261.09

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer International Publishing AG
26 April 2025
This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024.

The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.
Edited by:   , , ,
Imprint:   Springer International Publishing AG
Country of Publication:   Switzerland
Volume:   15456
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9783031893490
ISBN 10:   3031893492
Series:   Lecture Notes in Computer Science
Pages:   560
Publication Date:  
Audience:   Professional and scholarly ,  College/higher education ,  Undergraduate ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
.- Abstracts of Invited Talks. .- Horizontal Attack from Theory to Practice. .- Security for Safety Critical Systems in the Railways. .- Security Network Protocols. .- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks. .- Card-Based Secure Evaluation of Decision Trees. .- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach. .- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions. .- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy. .- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0. .- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects. .- AI-Driven Threat Detection. .- On the Properness of Large Language Models for Malware Detection. .- Automated Attack Tree Generation Using Artificial Intelligence & Natural Language Processing. .- Classifying Insider Threat Scenarios Through Explainable Artificial Intelligence. .- Automated Risk Assessment of Shell-Based Attacks Using a LLM. .- Information Security Management. .- ECU-KM : An Efficient Key Management for In-Vehicle Networks. .- Injecting Bias into Text Classification Models Using Backdoor Attacks. .- Towards New Models of Information Sharing. .- Distributed and Verifiable Digital Badges. .- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design. .- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach. .- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities. .- Applied Cryptography & Privacy. .- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning. .- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT. .- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map. .- Threats Detection & Protection. .- Preventing WebRTC IP Address Leaks. .- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. .- Device Fingerprinting Remediation in Android and iOS Apps. .- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements. .- Risk Identification & Management. .- A Safety Kernel for Flexible Level Crossing Management. .- Efficient Identification of UAVs Through Automatic Communication Frame Linking. .- Enterprise Risk Management in SMEs : Insights from West Africa. .- Blockchain & Distributed Ledger Security. .- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers. .- Modeling and Assessing Coercion Threats in Electronic Voting. .- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme. .- AI-Driven Threat Detection. .- Automated Assessment of the Exploits Using Deep Learning Methods. .- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-Off. .- Relevance of Image-Based Representation for Android Malware Detection.

See Also