Atjaunināt sīkdatņu piekrišanu

Attacks and Defenses for the Internet-of-Things: 7th International Conference, ADIoT 2024, Hangzhou, China, December 1314, 2024, Proceedings [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 169 pages, height x width: 235x155 mm, 24 Illustrations, color; 18 Illustrations, black and white; X, 169 p. 42 illus., 24 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15397
  • Izdošanas datums: 13-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031855922
  • ISBN-13: 9783031855924
  • Mīkstie vāki
  • Cena: 42,44 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 49,94 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 169 pages, height x width: 235x155 mm, 24 Illustrations, color; 18 Illustrations, black and white; X, 169 p. 42 illus., 24 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15397
  • Izdošanas datums: 13-Mar-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031855922
  • ISBN-13: 9783031855924

This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.
The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

An Efficient Edge based Privacy preserving Range Aggregation Scheme for
Aging in Place System.- An Empirical DNN Pruning Approach against Membership
Inference Attacks.- A Conflict Aware Active Automata Learning Approach for
BLE Device Status Machine Construction.- Optimizing Indoor Network Element
Layout for Enhanced Signal Coverage and Security in Location Based Services.-
An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc
Network.- An IoT Based Privacy Preserving Computer Aided Diagnosis System for
Skin Cancer Using Federated Learning and Homomorphic Encryption.- GCFuzz An
Intelligent Method for Generating IoT Protocols Test Cases using GAN with
CVAE.- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in
IoT.- Assessing the Effectiveness of LLMs in Android Application
Vulnerability Analysis.- Singularization A New Approach to Design Block
Ciphers for Resource Constrained Devices.