Mobile Internet Security (eBook, PDF)
6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers
Redaktion: You, Ilsun; Angin, Pelin; Kim, Hwankuk
65,95 €
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
65,95 €
Als Download kaufen
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
33 °P sammeln
Mobile Internet Security (eBook, PDF)
6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers
Redaktion: You, Ilsun; Angin, Pelin; Kim, Hwankuk
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: ¿5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 32.44MB
Andere Kunden interessierten sich auch für
- Mobile Internet Security (eBook, PDF)73,95 €
- Mobile Internet Security (eBook, PDF)57,95 €
- Computer Security - ESORICS 2022 (eBook, PDF)69,95 €
- Security and Privacy in Digital Economy (eBook, PDF)73,95 €
- Network and System Security (eBook, PDF)40,95 €
- Security and Privacy in Communication Networks (eBook, PDF)73,95 €
- Science of Cyber Security - SciSec 2022 Workshops (eBook, PDF)61,95 €
-
-
-
This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15-17, 2022.
The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: ¿5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 340
- Erscheinungstermin: 19. Juli 2023
- Englisch
- ISBN-13: 9789819944309
- Artikelnr.: 68451068
- Verlag: Springer Nature Singapore
- Seitenzahl: 340
- Erscheinungstermin: 19. Juli 2023
- Englisch
- ISBN-13: 9789819944309
- Artikelnr.: 68451068
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
5G Advanced and 6G Security.- Attacks Against Security Context in 5G Network.- A Systematic Approach to Security Management in the MonB5G Architecture.- A Study on 5G Security Activities in Japan.- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks.- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities.- AI for Security.- Parameters Transfer Framework for Multi-domain Fake News Detection.- Security SFC Path Selection Using Deep Reinforcement Learning.- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development.- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base.- Recent Challenges in a New Distributed Learning Paradigm.- Cryptography and Data Security.- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits.- Blind Decryption and Private Information Delivery.- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks.- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain.- Cyber Security.- DyBAnd: Dynamic Behavior-Based Android Malware Detection.- The Enhancement of FlexE Network Performance Based on Network Calculus Theory.- Security considerations of each layers in a cloud-native environment.- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.- IoT Application and Blockchain Security.- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System.- Blockchain-based Terminal Access Control in Software Defined Network.- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features.- A blockchain-based framework for audio copyright deposition
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
5G Advanced and 6G Security.- Attacks Against Security Context in 5G Network.- A Systematic Approach to Security Management in the MonB5G Architecture.- A Study on 5G Security Activities in Japan.- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks.- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities.- AI for Security.- Parameters Transfer Framework for Multi-domain Fake News Detection.- Security SFC Path Selection Using Deep Reinforcement Learning.- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development.- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base.- Recent Challenges in a New Distributed Learning Paradigm.- Cryptography and Data Security.- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits.- Blind Decryption and Private Information Delivery.- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks.- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain.- Cyber Security.- DyBAnd: Dynamic Behavior-Based Android Malware Detection.- The Enhancement of FlexE Network Performance Based on Network Calculus Theory.- Security considerations of each layers in a cloud-native environment.- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.- IoT Application and Blockchain Security.- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System.- Blockchain-based Terminal Access Control in Software Defined Network.- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features.- A blockchain-based framework for audio copyright deposition
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.