Atjaunināt sīkdatņu piekrišanu

Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 177 pages, height x width: 235x155 mm, weight: 296 g, 46 Illustrations, color; 19 Illustrations, black and white; X, 177 p. 65 illus., 46 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13745
  • Izdošanas datums: 11-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031213106
  • ISBN-13: 9783031213106
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 51,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 60,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 177 pages, height x width: 235x155 mm, weight: 296 g, 46 Illustrations, color; 19 Illustrations, black and white; X, 177 p. 65 illus., 46 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13745
  • Izdošanas datums: 11-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031213106
  • ISBN-13: 9783031213106
Citas grāmatas par šo tēmu:
This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions.





This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers.-
Evolving a Boolean Masked Adder Using Neuroevolution.- Explainable AI and
Deep Autoencoders Based Security Framework for IoT Network Attack Certainty.-
Constraints and Evaluations on Signature Transmission Interval for Aggregate
Signatures with Interactive Tracing Functionality.- Post-Quantum Secure
Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical
Unclonable Functions.- Effective Segmentation of RSSI Timeseries Produced by
Stationary IoT Nodes.- Consumer-friendly Methods for Privacy Protection
Against Cleaning Robots.- Resource Efficient Federated Deep Learning for IoT
Security Monitoring.- Man-in-the-OBD: A modular, Protocol Agnostic Firewall
for Automotive Dongles to Enhance Privacy and Security.- Mapping the Security
Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation.