Attacks and Defenses for the Internet-of-Things
Attacks and Defenses for the Internet-of-Things
7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024, Proceedings
Shao, Jun; Yung, Moti; Meng, Weizhi
Springer International Publishing AG
04/2025
171
Mole
9783031855924
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System.- An Empirical DNN Pruning Approach against Membership Inference Attacks.- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction.- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services.- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network.- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption.- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE.- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT.- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis.- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Malware and unwanted software;Vulnerability analysis and reverse engineering;IoT security and privacy;IoT forensic techniques;Usable security and privacy;Intrusion detection and prevention for IoT;Cyber intelligence techniques for IoT;IoT infrastructures and mitigation techniques;Hardware security;Cyber physical systems security;Adversarial learning for IoT;IoT Cyber crime;Denial-of-Service attacks for IoT;Security measurement for IoT
An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System.- An Empirical DNN Pruning Approach against Membership Inference Attacks.- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction.- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services.- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network.- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption.- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE.- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT.- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis.- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Malware and unwanted software;Vulnerability analysis and reverse engineering;IoT security and privacy;IoT forensic techniques;Usable security and privacy;Intrusion detection and prevention for IoT;Cyber intelligence techniques for IoT;IoT infrastructures and mitigation techniques;Hardware security;Cyber physical systems security;Adversarial learning for IoT;IoT Cyber crime;Denial-of-Service attacks for IoT;Security measurement for IoT