Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Mobile Internet Security -

Mobile Internet Security

The 8th International Conference, MobiSec 2024, Sapporo, Japan, December 17–19, 2024, Revised Selected Papers
Buch | Softcover
434 Seiten
2025
Springer Verlag, Singapore
978-981-95-0171-7 (ISBN)
CHF 194,70 inkl. MwSt
  • Versand in 10-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This book constitutes revised selected papers of the 8th International Conference on Mobile Internet Security, MobiSec 2024, held in Sapporo, Japan, during December 17–19, 2024.

The 28 full papers presented in this volume were carefully reviewed and selected from 93 submissions. Machine Learning-Based Security;
This book constitutes revised selected papers of the 8th International Conference on Mobile Internet Security, MobiSec 2024, held in Sapporo, Japan, during December 17–19, 2024.


The 28 full papers presented in this volume were carefully reviewed and selected from 93 submissions. 


They were grouped into the following topics: Cryptography; Cyber-Physical Systems / IoT Applications in Smart Environments; Identification and Authentication; Machine Learning-Based Security; Network Design and Security.

.- Cryptography.


.- Analysis of Backdoored (Classic) McEliece in a Multi-User Setting.


.- PRNG-Oriented Side-Channel Security Evaluation for TI-AES.


.- A High-Security Image Steganography System Employing Multiple Edge Detectors.


.- Efficient and Secure CSIDH using Relation Lattices.


.- Utilizing LLM Chatbots for Formal Descriptions of Cryptographic Protocols.


.- A Study on Parallel Tuple Sieve Algorithm.


.- A Blockchain-Based Approach for Secure Email Encryption with Variable ECC Key Lengths 
Selection.


.- The Amplified Boomerang Attack on ChaCha.


.- Bidirectional Proxy Re-Encryption Based on Isogenies.


.- Cyber-Physical Systems / IoT Applications in Smart Environments.


.- Early Heavy Rain Warning System by Cloud based Micrometeorological Data and Geographical 
Conditions with Numerous IoT Sensors.


.- Identification and Authentication.


.- Administration of Environment Aware Deep Learning Based Access Contro.


.- Securing Authentication and Authorization in Computing Continuum.


.- Machine Learning-Based Security.


.- ADL: A Method of Attack Detection with LLM by Assigning Traffic Sequencing in 5G IoT.


.- CAFL: Contrastive Learning and Self-Attention in Federated Learning.


.- A DDoS Attack Detection Method Based on an Ensemble of Small Models for Multi-Layer 
Satellite Networks.


.- A Comprehensive Study of Machine Learning Techniques for Malicious URL Detection in
Cybersecurity.


.- A Color-Based Data Poisoning Backdoor Approach for Misleading Adversarial Privacy
Prediction.


.- FLARE: A Blockchain Strategy for Hierarchical Federated Learning Algorithms.


.- An Enhanced Payload Image Steganography Employing Hybrid Edge Detection Technique and 
MSB Cover Image.


.- Lightweight Object-detection Model on Edge Devices for Safety and Security Applications.


.- Network Design and Security.


.- QoE-Driven Spot Pricing Schemes For Edge User Allocation Across the Distributed Cloud-Edge 
Continuum.


.- A Three-Pronged Approach to Malicious APK: Combining Snort, Wireshark, and Wazuh for 
Advanced Threat Management.


.- Enhancing Security with Virtualization and Real-time Communications for Applications on 
Autonomous Vehicles.


.- Resilient Multi-Path Aggregation Transmission Mechanism for Bandwidth Enhancement.


.- Stepping-Stone Intrusion Detection and its Development Trend.


.- Toward Correctness by Construction for Network Security Configuration.


.- A Novel Framework for Route Recommendation in Cooperative Vehicle Systems: The SHAFA 
Model.


.- Evaluation of a Startup Program Identification for Efficient and Accurate IoT Security 
Investigations.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo 106 Illustrations, color; 22 Illustrations, black and white
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Software Entwicklung Mobile- / App-Entwicklung
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte authentication • communication channels (information theory) • Communication Systems • computer crime • Computer Security
ISBN-10 981-95-0171-7 / 9819501717
ISBN-13 978-981-95-0171-7 / 9789819501717
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95