Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / [electronic resource] :
edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko.
- 1st ed. 2019.
- X, 181 p. 146 illus., 75 illus. in color. online resource.
- Communications in Computer and Information Science, 971 1865-0937 ; .
- Communications in Computer and Information Science, 971 .
Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
9789811337321
10.1007/978-981-13-3732-1 doi
Data protection.
Computer networks .
Artificial intelligence.
Data and Information Security.
Computer Communication Networks.
Artificial Intelligence.
QA76.9.A25
005.8
Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
9789811337321
10.1007/978-981-13-3732-1 doi
Data protection.
Computer networks .
Artificial intelligence.
Data and Information Security.
Computer Communication Networks.
Artificial Intelligence.
QA76.9.A25
005.8