000 | 04805nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-99-4430-9 | ||
003 | DE-He213 | ||
005 | 20240423125549.0 | ||
007 | cr nn 008mamaa | ||
008 | 230719s2023 si | s |||| 0|eng d | ||
020 |
_a9789819944309 _9978-981-99-4430-9 |
||
024 | 7 |
_a10.1007/978-981-99-4430-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aMobile Internet Security _h[electronic resource] : _b6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15–17, 2022, Revised Selected Papers / _cedited by Ilsun You, Hwankuk Kim, Pelin Angin. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 340 p. 130 illus., 107 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1644 |
|
505 | 0 | _a5G Advanced and 6G Security -- Attacks Against Security Context in 5G Network -- A Systematic Approach to Security Management in the MonB5G Architecture -- A Study on 5G Security Activities in Japan -- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks -- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities -- AI for Security -- Parameters Transfer Framework for Multi-domain Fake News Detection -- Security SFC Path Selection Using Deep Reinforcement Learning -- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development -- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base -- Recent Challenges in a New Distributed Learning Paradigm -- Cryptography and Data Security -- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits -- Blind Decryption and Private Information Delivery -- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks -- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain -- Cyber Security -- DyBAnd: Dynamic Behavior-Based Android Malware Detection -- The Enhancement of FlexE Network Performance Based on Network Calculus Theory -- Security considerations of each layers in a cloud-native environment -- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense -- IoT Application and Blockchain Security -- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System -- Blockchain-based Terminal Access Control in Software Defined Network -- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features -- A blockchain-based framework for audio copyright deposition vulnerabilities -- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks -- Web API Verifier for IoTtalk and Its Applications. . | |
520 | _aThis book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15–17, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
700 | 1 |
_aYou, Ilsun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKim, Hwankuk. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAngin, Pelin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819944293 |
776 | 0 | 8 |
_iPrinted edition: _z9789819944316 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1644 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-4430-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c179328 _d179328 |