Mobile Internet Security
6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers
Herausgegeben:You, Ilsun; Kim, Hwankuk; Angin, Pelin
Mobile Internet Security
6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers
Herausgegeben:You, Ilsun; Kim, Hwankuk; Angin, Pelin
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
Andere Kunden interessierten sich auch für
- Mobile Internet Security52,99 €
- Security and Privacy in Social Networks and Big Data48,99 €
- Advances in Cyber Security37,99 €
- Computer Security - ESORICS 202263,99 €
- Security and Privacy in Communication Networks74,99 €
- Cyber Security30,99 €
- Artificial Intelligence and Security81,99 €
-
-
-
This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022.
The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 1644
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-4429-3
- 1st ed. 2023
- Seitenzahl: 356
- Erscheinungstermin: 20. Juli 2023
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 540g
- ISBN-13: 9789819944293
- ISBN-10: 9819944295
- Artikelnr.: 68171723
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Communications in Computer and Information Science 1644
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-4429-3
- 1st ed. 2023
- Seitenzahl: 356
- Erscheinungstermin: 20. Juli 2023
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 540g
- ISBN-13: 9789819944293
- ISBN-10: 9819944295
- Artikelnr.: 68171723
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
5G Advanced and 6G Security.- Attacks Against Security Context in 5G Network.- A Systematic Approach to Security Management in the MonB5G Architecture.- A Study on 5G Security Activities in Japan.- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks.- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities.- AI for Security.- Parameters Transfer Framework for Multi-domain Fake News Detection.- Security SFC Path Selection Using Deep Reinforcement Learning.- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development.- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base.- Recent Challenges in a New Distributed Learning Paradigm.- Cryptography and Data Security.- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits.- Blind Decryption and Private Information Delivery.- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks.- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain.- Cyber Security.- DyBAnd: Dynamic Behavior-Based Android Malware Detection.- The Enhancement of FlexE Network Performance Based on Network Calculus Theory.- Security considerations of each layers in a cloud-native environment.- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.- IoT Application and Blockchain Security.- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System.- Blockchain-based Terminal Access Control in Software Defined Network.- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features.- A blockchain-based framework for audio copyright deposition
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
5G Advanced and 6G Security.- Attacks Against Security Context in 5G Network.- A Systematic Approach to Security Management in the MonB5G Architecture.- A Study on 5G Security Activities in Japan.- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks.- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities.- AI for Security.- Parameters Transfer Framework for Multi-domain Fake News Detection.- Security SFC Path Selection Using Deep Reinforcement Learning.- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development.- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base.- Recent Challenges in a New Distributed Learning Paradigm.- Cryptography and Data Security.- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits.- Blind Decryption and Private Information Delivery.- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks.- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain.- Cyber Security.- DyBAnd: Dynamic Behavior-Based Android Malware Detection.- The Enhancement of FlexE Network Performance Based on Network Calculus Theory.- Security considerations of each layers in a cloud-native environment.- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.- IoT Application and Blockchain Security.- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System.- Blockchain-based Terminal Access Control in Software Defined Network.- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features.- A blockchain-based framework for audio copyright deposition
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.