소장자료
LDR | 04023nam a22006255i 4500 | ||
001 | 0100775304▲ | ||
003 | DE-He213▲ | ||
005 | 20231017155759▲ | ||
007 | cr nn 008mamaa▲ | ||
008 | 221210s2022 sz | s |||| 0|eng d▲ | ||
020 | ▼a9783031213113▼9978-3-031-21311-3▲ | ||
024 | 7 | ▼a10.1007/978-3-031-21311-3▼2doi▲ | |
050 | 4 | ▼aTK5105.8857▲ | |
082 | 0 | 4 | ▼a004.678▼223▲ |
245 | 1 | 0 | ▼aAttacks and Defenses for the Internet-of-Things▼h[electronic resource] :▼b5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers /▼cedited by Wenjuan Li, Steven Furnell, Weizhi Meng.▲ |
250 | ▼a1st ed. 2022.▲ | ||
264 | 1 | ▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2022.▲ | |
300 | ▼aX, 177 p. 65 illus., 46 illus. in color.▼bonline resource.▲ | ||
336 | ▼atext▼btxt▼2rdacontent▲ | ||
337 | ▼acomputer▼bc▼2rdamedia▲ | ||
338 | ▼aonline resource▼bcr▼2rdacarrier▲ | ||
347 | ▼atext file▼bPDF▼2rda▲ | ||
490 | 1 | ▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v13745▲ | |
505 | 0 | ▼aThe Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. .▲ | |
520 | ▼aThis book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.▲ | ||
650 | 0 | ▼aInternet of things.▲ | |
650 | 0 | ▼aComputer networks .▲ | |
650 | 0 | ▼aComputers.▲ | |
650 | 0 | ▼aCryptography.▲ | |
650 | 0 | ▼aData encryption (Computer science).▲ | |
650 | 0 | ▼aComputer networks—Security measures.▲ | |
650 | 0 | ▼aSoftware engineering.▲ | |
650 | 1 | 4 | ▼aInternet of Things.▲ |
650 | 2 | 4 | ▼aComputer Communication Networks.▲ |
650 | 2 | 4 | ▼aComputing Milieux.▲ |
650 | 2 | 4 | ▼aCryptology.▲ |
650 | 2 | 4 | ▼aMobile and Network Security.▲ |
650 | 2 | 4 | ▼aSoftware Engineering.▲ |
700 | 1 | ▼aLi, Wenjuan.▼eeditor.▼0(orcid)0000-0003-3745-5669▼1https://orcid.org/0000-0003-3745-5669▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aFurnell, Steven.▼eeditor.▼0(orcid)0000-0003-0984-7542▼1https://orcid.org/0000-0003-0984-7542▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aMeng, Weizhi.▼eeditor.▼0(orcid)0000-0003-4384-5786▼1https://orcid.org/0000-0003-4384-5786▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
710 | 2 | ▼aSpringerLink (Online service)▲ | |
773 | 0 | ▼tSpringer Nature eBook▲ | |
776 | 0 | 8 | ▼iPrinted edition:▼z9783031213106▲ |
776 | 0 | 8 | ▼iPrinted edition:▼z9783031213120▲ |
830 | 0 | ▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v13745▲ | |
856 | 4 | 0 | ▼uhttps://doi.org/10.1007/978-3-031-21311-3▲ |

Attacks and Defenses for the Internet-of-Things[electronic resource] : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers
자료유형
국외eBook
서명/책임사항
Attacks and Defenses for the Internet-of-Things [electronic resource] : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers / edited by Wenjuan Li, Steven Furnell, Weizhi Meng.
판사항
1st ed. 2022.
형태사항
X, 177 p. 65 illus., 46 illus. in color. online resource.
총서사항
Lecture Notes in Computer Science , 1611-3349 ; 13745
Lecture Notes in Computer Science , 1611-3349 ; 13745
Lecture Notes in Computer Science , 1611-3349 ; 13745
내용주기
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. .
요약주기
This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
주제
ISBN
9783031213113
관련 인기대출 도서