default search action
MobiSec 2022: Jeju Island, South Korea
- Ilsun You, Hwankuk Kim, Pelin Angin:
Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1644, Springer 2023, ISBN 978-981-99-4429-3
5G Advanced and 6G Security
- Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu:
Attacks Against Security Context in 5G Network. 3-17 - Slawomir Kuklinski, Jacek Wytrebowicz:
A Systematic Approach to Security Management in the MonB5G Architecture. 18-32 - SeongHan Shin:
A Study on 5G Security Activities in Japan. 33-47 - Borja Bordel, Ramón Alcarria, Joaquin Chung, Ivan Armuelles Voinov:
Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks. 48-62 - Dowon Kim, Ilsun You, Seongmin Park, SungMoon Kwon:
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities. 63-81
AI for Security
- Rafal Kozik, Krzysztof Samp, Michal Choras, Marek Pawlicki:
Parameters Transfer Framework for Multi-domain Fake News Detection. 85-96 - Shuangxing Deng, Man Li, Qi Guo, Huachun Zhou:
Security SFC Path Selection Using Deep Reinforcement Learning. 97-107 - Jeongbin Lee, Jaewoong Kang, Mye M. Sohn:
Data Sub-sampling Method for Developing Personalized Human Activity Model Based on Incremental Learning. 108-121 - Ouyang Liu, Kun Li, Ziwei Yin, Huachun Zhou:
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base. 122-133 - Sandi Rahmadika, Bayu Ramadhani Fajri, Geovanne Farell, Ahmaddul Hadi, Khairi Budayawan:
Recent Challenges in a New Distributed Learning Paradigm. 134-144
Cryptography and Data Security
- S. K. Karthika, Kunwar Singh:
Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 Bits. 147-164 - Akihiro Yamamura:
Blind Decryption and Private Information Delivery. 165-179 - Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen:
Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN. 180-194 - Yuzheng Yang, Zhe Tu, Haoxiang Song, Huachun Zhou:
A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain. 195-206
Cyber Security
- Shashank Jaiswal, Vikas Sihag, Gaurav Choudhary, Nicola Dragoni:
DyBAnd: Dynamic Behavior Based Android Malware Detection. 209-219 - Kaiqiang Gao, Zhihui Wang, Juan Pan, Yuhang Pang, Lei Wei, Song Jiang:
The Enhancement of FlexE Network Performance Based on Network Calculus Theory. 220-230 - Youngsoo Kim, Cheolhee Park, Yongyoon Shin:
Security Consideration of Each Layers in a Cloud-Native Environment. 231-242 - Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. 243-253
IoT Application and Blockchain Security
- Noriki Uchida, Shigeyuki Endo, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata:
Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System. 257-267 - Bingcheng Jiang, Qian He, Qi Pan, Mingliu He:
Blockchain-Based Terminal Access Control in Software Defined Network. 268-279 - Ruichi Yan, Guohua Tian, Shichong Tan, Zhengtao Jiang:
A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features. 280-291 - Ridong Huang, Jianmao Xiao, Jing Zhao, Jiangyu Wang, Yuhang Zhang, Siqi Chen, Jianyu Zou, Yuanlong Cao, Youliang Ma:
A Blockchain-Based Framework for Audio Copyright Deposition. 292-307 - Erukala Suresh Babu, Aswani Devi Aguru, Bhukya Padma:
A Trust-Based Blockchain System for Secured Migration of BLE Devices in IoT Networks. 308-322 - Wen-Yu Lin, Min-Zheng Shieh, Yi-Bing Lin:
Web API Verifier for IoTtalk and Its Applications. 323-337
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.