Attacks and Defenses for the Internet-of-Things

Attacks and Defenses for the Internet-of-Things

7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024, Proceedings

Shao, Jun; Yung, Moti; Meng, Weizhi

Springer International Publishing AG

04/2025

171

Mole

9783031855924

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System.- An Empirical DNN Pruning Approach against Membership Inference Attacks.- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction.- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services.- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network.- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption.- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE.- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT.- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis.- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.
Malware and unwanted software;Vulnerability analysis and reverse engineering;IoT security and privacy;IoT forensic techniques;Usable security and privacy;Intrusion detection and prevention for IoT;Cyber intelligence techniques for IoT;IoT infrastructures and mitigation techniques;Hardware security;Cyber physical systems security;Adversarial learning for IoT;IoT Cyber crime;Denial-of-Service attacks for IoT;Security measurement for IoT