Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Attacks and Defenses for the Interne...
~
ADIoT (Workshop) (2022 :)
Linked to FindBook
Google Book
Amazon
博客來
Attacks and Defenses for the Internet-of-Things = 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Attacks and Defenses for the Internet-of-Things/ edited by Wenjuan Li, Steven Furnell, Weizhi Meng.
Reminder of title:
5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers /
remainder title:
ADIoT 2022
other author:
Wenjuan, Li.
corporate name:
ADIoT (Workshop)
Published:
Cham :Springer Nature Switzerland : : 2022.,
Description:
x, 177 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation.
Contained By:
Springer Nature eBook
Subject:
Internet of things - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-21311-3
ISBN:
9783031213113
Attacks and Defenses for the Internet-of-Things = 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers /
Attacks and Defenses for the Internet-of-Things
5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers /[electronic resource] :ADIoT 2022edited by Wenjuan Li, Steven Furnell, Weizhi Meng. - Cham :Springer Nature Switzerland :2022. - x, 177 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,137450302-9743 ;. - Lecture notes in computer science ;13745..
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation.
This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
ISBN: 9783031213113
Standard No.: 10.1007/978-3-031-21311-3doiSubjects--Topical Terms:
3135380
Internet of things
--Congresses.
LC Class. No.: TK5105.8857
Dewey Class. No.: 004.678
Attacks and Defenses for the Internet-of-Things = 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers /
LDR
:02631nmm a2200349 a 4500
001
2306813
003
DE-He213
005
20221210124610.0
006
m d
007
cr nn 008maaau
008
230421s2022 sz s 0 eng d
020
$a
9783031213113
$q
(electronic bk.)
020
$a
9783031213106
$q
(paper)
024
7
$a
10.1007/978-3-031-21311-3
$2
doi
035
$a
978-3-031-21311-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
072
7
$a
UT
$2
bicssc
072
7
$a
TEC007000
$2
bisacsh
072
7
$a
UT
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.A235 2022
111
2
$a
ADIoT (Workshop)
$n
(5th :
$d
2022 :
$c
Copenhagen, Denmark)
$3
3611403
245
1 0
$a
Attacks and Defenses for the Internet-of-Things
$h
[electronic resource] :
$b
5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers /
$c
edited by Wenjuan Li, Steven Furnell, Weizhi Meng.
246
3
$a
ADIoT 2022
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2022.
300
$a
x, 177 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13745
505
0
$a
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation.
520
$a
This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
650
0
$a
Internet of things
$v
Congresses.
$3
3135380
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
700
1
$a
Wenjuan, Li.
$3
3611404
700
1
$a
Furnell, Steven.
$3
898634
700
1
$a
Weizhi, Meng.
$3
3611405
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13745.
$3
3611406
856
4 0
$u
https://doi.org/10.1007/978-3-031-21311-3
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9447773
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login