
This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows:
Security Foundations and Compliance; AI for Security and Dependability; Consensus, Cryptography, and Blockchain; Modeling and Dependability Evaluation; Advances in Dependable and Secure Computing; Monitoring and Critical Infrastructures; Industry Track, and Student Forum.
Inhaltsverzeichnis
. - Security Foundations and Compliance.
. - Applying DevSecOps Approach in Legacy Computing Infrastructures:A Case Study in Public Sector of Brazil.
. - SPIRE-Based Remote Attestation for Secure VPN Access.
. - Towards a Minimum Security Baseline for Cyber-Physical Systems through Security Standards Harmonization.
. - Towards LGPD Compliance: Analysis and Support to Prepare your Computing Environment.
. - AI for Security and Dependability.
. - An Empirical Study of Large Language Models as Experts in Software Trustworthiness Assessment.
. - FlowMon: A Workflow-Driven Visual Tool for Automated Monitoring Script Generation.
. - Reasoning Over Vulnerabilities via LogiSec of Thoughts: A Reductio Ad Absurdum-Based LLM Framework.
. - Consensus, Cryptography, and Blockchain.
. - A Blockchain-Based Architecture for Communication Between Spectrum Access Systems.
. - Byzantine Consensus with Secure and Intrusion-Tolerant In-Network Ordering.
. - Thetacrypt: A Distributed Service for Threshold Cryptography.
. - Modeling and Dependability Evaluation.
. - A Practical TLA+ Library for Designing and Verifying Distributed Systems.
. - Long-Term Experimental Evaluation of Software Aging Effects in NoSQL Database.
. - Advances in Dependable and Secure Computing (Best Paper Candidates).
. - Addressing Cryptographic Overheads in Low-Latency File Systems through Ahead-of-Time Encryption.
. - Evaluating eBPF as an Alternative to Virtual Machine Introspection for High-Interaction Honeypot Implementation.
. - Source Code Vulnerability Detection and Interpretability with Language Models.
. - Monitoring and Critical Infrastructures.
. - Impact of Image Resolution on Drone Surveillance System Availability:A Stochastic Petri Net Approach.
. - Quantitative Availability Analysis of Fog-Edge Monitoring Architectures in Bus Rapid Transit Station.
. - Industry Track.
. - Malware Detection in Windows Operating Systems using AI and In-Memory Process Analysis.
. - Risk Classification of IP Addresses Using Machine Learning with Weighted Voting Approach.
. - Student Forum.
. - Improving Safety in Industry 4. 0 using an IoT-Helmet.
. - Forecasting-Oriented Management of Software-Defined Fabric Environments.
. - Service Level Agreements Compliance in 5G Network Slicing: An Analysis of Resource Allocation Strategies.
. - Towards Hierarchical Byzantine Distributed Replication.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "Dependable and Secure Computing" und helfen Sie damit anderen bei der Kaufentscheidung.