Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III

This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.

The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on

Privacy and Cryptography

AI for cybersecurity and Adversial models

Quantum Computing in Cybersecurity

Network Security

Blockchain and Cryptocurrencies

Fuzzing and IoT security

Malware and Attack Analysis

Web Security

Authentication

Large Language Model for Cybersecurity

Security Assessments

1147319842
Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III

This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.

The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on

Privacy and Cryptography

AI for cybersecurity and Adversial models

Quantum Computing in Cybersecurity

Network Security

Blockchain and Cryptocurrencies

Fuzzing and IoT security

Malware and Attack Analysis

Web Security

Authentication

Large Language Model for Cybersecurity

Security Assessments

64.99 In Stock
Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III

Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III

Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III

Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III

eBook

$64.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.

The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on

Privacy and Cryptography

AI for cybersecurity and Adversial models

Quantum Computing in Cybersecurity

Network Security

Blockchain and Cryptocurrencies

Fuzzing and IoT security

Malware and Attack Analysis

Web Security

Authentication

Large Language Model for Cybersecurity

Security Assessments


Product Details

ISBN-13: 9783031944550
Publisher: Springer-Verlag New York, LLC
Publication date: 09/04/2025
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , #629
Sold by: Barnes & Noble
Format: eBook
File size: 55 MB
Note: This product may take a few minutes to download.

Table of Contents

Fuzzing and IoT security.- Fast Firmware Fuzz with Input/Output Reposition.- ChipFuzzer: Towards Fuzzing Matter based IoT Devices for Vulnerability Detection.- Reusablity Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity.- Multi Server Publicly Verifiable Computation of polynomials.- Siamese Neural Network for Robust IoT Device Type Identification: A Few Shot Learning Approach.- FISFuzzer: A Grey Box Protocol Fuzzer Based on Field Inference and Scheduling.- Malware and Attack Analysis.- Mal POBM: A Genetic Algorithm for Malware Adversarial Sample Generation.- Graphite: Real Time Graph Based Detection of Windows Fileless Malware Attacks.- Robust Network Intrusion Detection via Semi-Supervised Deep Reinforcement Learning.- BinSimDB: Benchmark Dataset Construction for Fine Grained Binary Code Similarity Analysis.- OnionPeeler: A Novel Input Enriched Website Fingerprinting Attack on Tor Onion Services.- Web Security.- Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real Time Smart Contract Analysis.- Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts.-ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection.- EasyCSPeasy: A Server side and Language agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP.- Encoder based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection.- Bag of Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security.- AutoS2ploit: From Automotive Safety Critical Functionalities to Security Exploit.- Pitfalls of data masking techniques: Re-identification attacks.- Faster Three Party Constant round Comparison with Application in Neural Network Inference.- WtLDP:Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy.- Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification.

From the B&N Reads Blog

Customer Reviews