Foundations and practice of security Part 2

Short Papers.- UCAT: the Uniform Categorization for Access Control.- Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach.- Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection.- Evaluating Deep Learning for Cross-Domains Fake News Detection...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: International Symposium on Foundations and Practice of Security (VerfasserIn)
Weitere Verfasser: Ahmed, Toufik (HerausgeberIn), Boulahia-Cuppens, Nora (HerausgeberIn), Garcia-Alfaro, Joaquin (HerausgeberIn), Mosbah, Mohamed (HerausgeberIn), Sèdes, Florence (HerausgeberIn), Tawbi, Nadia (HerausgeberIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Cham Springer 2024
Schriftenreihe:Lecture notes in computer science 14552
Schlagworte:
Online Zugang:Cover
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Short Papers.- UCAT: the Uniform Categorization for Access Control.- Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach.- Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection.- Evaluating Deep Learning for Cross-Domains Fake News Detection.- Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting.- Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication.- SADIS: real-time sound-based anomaly detection for industrial systems.- A resilience Component for a Digital Twin.
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis. Part II : security design, short papers
Beschreibung:Literaturangaben
Beschreibung:xix, 106 Seiten
Illustrationen, Diagramme
ISBN:9783031575396
978-3-031-57539-6