


default search action
MobiSec 2021: Jeju Island, Republic of Korea
- Ilsun You
, Hwankuk Kim
, Taek-Young Youn
, Francesco Palmieri
, Igor V. Kotenko
:
Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1544, Springer 2022, ISBN 978-981-16-9575-9
IoT and Cyber Security
- Kun-Lin Tsai
, Li-Woei Chen, Fang-Yie Leu
, Hsiung-Chieh Hsu, Chuan-Tian Wu:
Secure LoRaWAN Root Key Update Scheme for IoT Environment. 3-15 - Borja Bordel
, Ramón Alcarria
:
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments. 16-29 - Daniel Gerbi Duguma
, Philip Virgil Astillo
, Yonas Engida Gebremariam
, Bonam Kim
, Ilsun You
:
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System. 30-43 - Yueqing Gao, Yuting Shen, Huachun Zhou, Benhui Shi, Lulu Chen, Chu Du:
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability. 44-51 - Minhwan Kim, Hanmin Kim, Gyudong Park, Mye M. Sohn:
Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs. 52-64 - Yan Zhao
, Ning Hu
, Jincai Zou
, Yuqiang Zhang
:
A Secure Dispersed Computing Scheme for Internet of Mobile Things. 65-78 - Andrei D. Dakhnovich
, Dmitrii A. Moskvin
, Dmitry P. Zegzhda
:
A Necessary Condition for Industrial Internet of Things Sustainability. 79-89
Blockchain Security
- Paresh Sajan Gharat, Gaurav Choudhary
, Shishir Kumar Shandilya
, Vikas Sihag
:
Future Applications of Blockchain in Education Sector: A Semantic Review. 93-106 - Monika Bharti
, Rajesh Kumar
, Sharad Saxena
, Vishal Sharma
:
A Resource-Blockchain Framework for Safeguarding IoT. 107-121 - Tianhong Zhang, Zejun Lan, Xianming Gao, Jianfeng Guan:
The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method. 122-138 - Yuyuan Shi, Xianming Gao, Jianfeng Guan:
Smart Contract-Based Personal Data Protection Framework: In Cross-App Advertising. 139-154 - Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su:
A Blockchain-Based Authentication Scheme for 5G Applications. 155-168
Digital Forensic and Malware Analysis
- Gianni D'Angelo
, Francesco Palmieri
, Antonio Robustelli
:
Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders. 171-194 - Wei Zong
, Yang-Wai Chow
, Willy Susilo
, Jongkil Kim
:
Trojan Attacks and Defense for Speech Recognition. 195-210 - Elena B. Aleksandrova
, Maria A. Poltavtseva
, Vadim S. Shmatov
:
Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations. 211-221 - Rahul Sinha, Vikas Sihag
, Gaurav Choudhary
, Manu Vardhan
, Pradeep Singh:
Forensic Analysis of Fitness Applications on Android. 222-235 - Deepali Moad, Vikas Sihag
, Gaurav Choudhary
, Daniel Gerbi Duguma
, Ilsun You
:
Fingerprint Defender: Defense Against Browser-Based User Tracking. 236-247 - Alisa A. Vorobeva
, Guldar Khisaeva
, Danil Zakoldaev
, Igor V. Kotenko
:
Detection of Business Email Compromise Attacks with Writing Style Analysis. 248-262 - Yu-kyung Kim
, Jemin Justin Lee
, Myong-Hyun Go, Hae Young Kang
, Kyungho Lee
:
A Systematic Literature Review on the Mobile Malware Detection Methods. 263-288 - Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho
, Younjai Park, Minkyu Park
:
Forensic Analysis of Apple CarPlay: A Case Study. 289-300 - Konstantin E. Izrailov
, Dmitry Levshun
, Igor V. Kotenko
, Andrey Chechulin
:
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces. 301-319
5G Virtual Infrastructure, Cryptography and Network Security
- Lejun Ji
, Gang Lei
, Ruiwen Ji
, Yuanlong Cao
, Xun Shao
, Xin Huang
:
Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP. 323-334 - Zhe Tu
, Huachun Zhou, Kun Li
, Haoxiang Song, Weilin Wang
:
A Blockchain-Based User Identity Authentication Method for 5G. 335-351 - Weilin Wang
, Huachun Zhou, Kun Li
, Zhe Tu
, Feiyang Liu:
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G. 352-364 - Man Li
, Yajuan Qin, Huachun Zhou:
A DDoS Detection Method with Feature Set Dimension Reduction. 365-378 - WonHaeng Lee
, Keon Yun, MyungWoo Chung, JinHyeok Oh, HyunJun Shin, KwonKoo Kwak:
Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System Under 5G Environment. 379-395 - Xinda Cheng, Yixing Chen, Jincai Zou, Yuqiang Zhang, Ning Hu:
An Anonymous Communication System Based on Software Defined Architecture. 396-407 - Haoran Tao
, Ning Ding
, Tianhui Huang
, Kehan Yu
, Dongsheng Qian
, Yan Luo
, Yuyin Ma
:
Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network. 408-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.