Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    b3kat_BV050150421
    Umfang: 1 Online-Ressource (xiii, 502 Seiten) , Illustrationen
    ISBN: 9783031790072
    Serie: Lecture notes in computer science 15396
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-79006-5
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-79008-9
    Sprache: Englisch
    Schlagwort(e): Datensicherung ; Computersicherheit ; Kryptoanalyse ; Privatsphäre ; Kritische Infrastruktur ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949948814802882
    Umfang: XIII, 502 p. 110 illus., 85 illus. in color. , online resource.
    Ausgabe: 1st ed. 2025.
    ISBN: 9783031790072
    Serie: Lecture Notes in Computer Science, 15396
    Inhalt: NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
    Anmerkung: -- Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama - Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole - A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783031790065
    Weitere Ausg.: Printed edition: ISBN 9783031790089
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almafu_9961812875302883
    Umfang: 1 online resource (628 pages)
    Ausgabe: 1st ed. 2025.
    ISBN: 9783031790072 , 3031790073
    Serie: Lecture Notes in Computer Science, 15396
    Inhalt: NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure.
    Anmerkung: -- Authentication. -- Are Swedish Passwords Tougher Than the Rest?. -- Towards Exploring Cross-Regional and Cross-Platform Differences in Login Throttling. -- Cryptography. -- Determining the A5 encryption algorithms used in 2G (GSM) networks. -- Misbinding Raw Public Keys to Identities in TLS. -- Small Private Exponent Attacks on Takagi Family Schemes. -- Cyber-Physical Systems. -- A Comparison of Deep Learning Approaches for Power-based Side-channel Attacks. -- Binary-Level Code Injection for Automated Tool Support on the ESP32 Platform. -- Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. -- Cybersecurity and Policy. -- A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights. -- NIS2 Directive in Sweden: A Report on the Readiness of Swedish Critical Infrastructure. -- The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. -- LLMs for Security. -- Evaluating Large Language Models in Cybersecurity Knowledge with Cisco Certificates. -- How to Train Your Llama – Efficient Grammar-Based Application Fuzzing Using Large Language Models. -- The Dual-Edged Sword of Large Language Models in Phishing. -- Formal Verification. -- Analysing TLS Implementations using Full-Message Symbolic Execution. -- Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors. -- Mobile & IoT. -- Beware of the Rabbit Hole – A Digital Forensic Case Study of DIY Drones. -- GOTCHA: Physical Intrusion Detection with Active Acoustic Sensing using a Smart Speaker. -- Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study. -- Network Security. -- CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic. -- Fingerprinting DNS Resolvers using Query Patterns from QNAME Minimization. -- Formally Discovering and Reproducing Network Protocols Vulnerabilities. -- Privacy. -- Enhancing Noise Estimation for Statistical Disclosure Attacks using the Artificial Bee Colony Algorithm. -- Left Alone Facing a Difficult Choice: An Expert Analysis of Websites Promoting Selected Privacy-Enhancing Technologies. -- Optimizing Onionbalance: Improving Scalability and Security for Tor Onion Services.
    Weitere Ausg.: ISBN 9783031790065
    Weitere Ausg.: ISBN 3031790065
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 3031790065?
Meinten Sie 3031790243?
Meinten Sie 3031730003?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz