会议文集


文集名Foundations and Practice of Security
会议名17th International Symposium on Foundations and Practice of Security (FPS 2024)
中译名《第十七届国际安全原理与实践研讨会,卷1》
会议日期December 9-11, 2024
会议地点Montreal, QC, Canada
出版年2025
馆藏号356958


题名作者出版年
The Perfect Victim? Family Offices as Targets for CybercriminalsBrian H. Nussbaum; Kimberly A. Cornell; Li Huang2025
Advanced Real-Time Detection of Cyber Threat Information from TweetsMohamed El Amine Bekhouche; Kamel Adi2025
Mitigating Spillover Effects of Ransomware in Financial Markets: Lessons from the LockBit AttacksFrederic Schlackl; Alina Dulipovici; Vincent Gregoire2025
Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus PerspectiveDane Vanderkooi; Atefeh Mashatan; Ozgur Turetken2025
ICoSSiuM: An Integrated Communication Security Simulator for Maritime OperationsLyes Bayou; Ali Awarkeh; Mohamed-El-Hadi Haouari; Reda Yaich; Marc-Antoine Faillon2025
Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security ExpertsCarmen Cheh; Nan Shing Kham Shing; Edwin Ching Jitt Ang; Binbin Chen; Desmond Cher; Frank Liauw; Reuben Liang Yi Lim2025
An Approach to Determine a System's Behavioural Security PostureJohn Breton; Jason Jaskolka; George O. M. Yee2025
Secure Data Traceability for Mobile Data CollectorsBilel Zaghdoudi; Christine Hennebert; Maria Potop-Butucaru2025
Toward Automatic Enforcement of Security Patterns in Software Architecture Using AlloyQuentin Rouland; Kamel Adi; Omer Nguena Timo; Luigi Logrippo2025
Light-SABRE: A Lightweight Encrypted Data Distribution System for Internet of ThingsNakul Ghate; Shohei Mitani; Hirofumi Ueda2025
Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative AnalysisMohamed El Amine Bekhouche; Myria Bouhaddi; Wahib Larbi; Kamel Adi2025
Drone Anomaly Detection: Dataset and Unsupervised Machine LearningZhuo Chen; Issa Traore; Mohammad Mamun; Sherif Saad2025
A Tool for Enabling Scalable Automation in Security Control SelectionDylan Leveille; Jason Jaskolka2025
A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and PracticeGeorge Silva; Norah Ridley; Enrico Branca; Natalia Stakhanova2025
An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy MiningThang Bui; Elliot Shabram; Anthony Matricia2025
Does Gender Matter? Examining and Mitigating Gender Bias in Fake News DetectionDorsaf Sallami; Esma Aimeur2025
ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-domain Fake News DetectionMohammad Q. Alnabhan; Paula Branco2025
Parametric Automata for Dynamic Access Control PoliciesFranck Fotso Kuate; Florent Avellaneda; Omer Nguena Timo2025
Fingerprinting Connected Wi-Fi Devices Using Per-network MAC AddressesAbhishek Kumar Mishra; Samuel Pelissier; Mathieu Cunche2025
Privacy Guard: Empowering Users with Privacy Labels and Intuitive AppsKhosro Salmani; Alyssa Landeta; Mohit Gupta; Chidera Uzoka2025
12