Mobile Internet Security [electronic resource] : 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers / edited by Ilsun You, Hwankuk Kim, Pelin Angin.

Colaborador(es): You, Ilsun [editor.] | Kim, Hwankuk [editor.] | Angin, Pelin [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Communications in Computer and Information Science ; 1644Editor: Singapore : Springer Nature Singapore : Imprint: Springer, 2023Edición: 1st ed. 2023Descripción: XIII, 340 p. 130 illus., 107 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789819944309Tema(s): Data protection | Artificial intelligence | Computer engineering | Computer networks  | Data and Information Security | Artificial Intelligence | Computer Engineering and NetworksFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTexto
Contenidos:
5G Advanced and 6G Security -- Attacks Against Security Context in 5G Network -- A Systematic Approach to Security Management in the MonB5G Architecture -- A Study on 5G Security Activities in Japan -- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks -- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities -- AI for Security -- Parameters Transfer Framework for Multi-domain Fake News Detection -- Security SFC Path Selection Using Deep Reinforcement Learning -- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development -- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks -- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain -- Cyber Security -- DyBAnd: Dynamic Behavior-Based Android Malware Detection -- The Enhancement of FlexE Network Performance Based on Network Calculus Theory -- Security considerations of each layers in a cloud-native environment -- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense -- IoT Application and Blockchain Security -- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System -- Blockchain-based Terminal Access Control in Software Defined Network -- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features -- A blockchain-based framework for audio copyright deposition vulnerabilities -- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks -- Web API Verifier for IoTtalk and Its Applications. .
En: Springer Nature eBookResumen: This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Acceso multiusuario

5G Advanced and 6G Security -- Attacks Against Security Context in 5G Network -- A Systematic Approach to Security Management in the MonB5G Architecture -- A Study on 5G Security Activities in Japan -- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks -- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities -- AI for Security -- Parameters Transfer Framework for Multi-domain Fake News Detection -- Security SFC Path Selection Using Deep Reinforcement Learning -- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development -- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks -- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain -- Cyber Security -- DyBAnd: Dynamic Behavior-Based Android Malware Detection -- The Enhancement of FlexE Network Performance Based on Network Calculus Theory -- Security considerations of each layers in a cloud-native environment -- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense -- IoT Application and Blockchain Security -- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System -- Blockchain-based Terminal Access Control in Software Defined Network -- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features -- A blockchain-based framework for audio copyright deposition vulnerabilities -- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks -- Web API Verifier for IoTtalk and Its Applications. .

This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.

UABC ; Perpetuidad

Con tecnología Koha