Mobile Internet Security
Springer Verlag, Singapore
978-981-99-4429-3 (ISBN)
The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
lt;b> 5G Advanced and 6G Security.- Attacks Against Security Context in 5G Network.- A Systematic Approach to Security Management in the MonB5G Architecture.- A Study on 5G Security Activities in Japan.- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks.- Building and utilizing small-scale testbed for research on 5G SA network-related security vulnerabilities.- AI for Security.- Parameters Transfer Framework for Multi-domain Fake News Detection.- Security SFC Path Selection Using Deep Reinforcement Learning.- Data Sub-sampling Method for Incremental Learning based Personalized Human Activity Model Development.- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base.- Recent Challenges in a New Distributed Learning Paradigm.- Cryptography and Data Security.- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits.- Blind Decryption and Private Information Delivery.- Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks.- A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain.- Cyber Security.- DyBAnd: Dynamic Behavior-Based Android Malware Detection.- The Enhancement of FlexE Network Performance Based on Network Calculus Theory.- Security considerations of each layers in a cloud-native environment.- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.- IoT Application and Blockchain Security.- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System.- Blockchain-based Terminal Access Control in Software Defined Network.- A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features.- A blockchain-based framework for audio copyright deposition
vulnerabilities.- A Trust-based blockchain System for Secured Migration of BLE Devices in IoT networks.- Web API Verifier for IoTtalk and Its Applications.
Erscheinungsdatum | 25.07.2023 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | 107 Illustrations, color; 23 Illustrations, black and white; XIII, 340 p. 130 illus., 107 illus. in color. |
Verlagsort | Singapore |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Software Entwicklung ► Mobile- / App-Entwicklung | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Schlagworte | Applications • authentication • communication channels (information theory) • Communication Systems • computer crime • Computer Science • Computer Security • conference proceedings • cryptography • Databases • Data communication systems • Data Security • Informatics • Network Protocols • Network Security • privacy • Research • Signal Processing • Telecommunication networks |
ISBN-10 | 981-99-4429-5 / 9819944295 |
ISBN-13 | 978-981-99-4429-3 / 9789819944293 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich