default search action
MobiSec 2021: Jeju Island, Republic of Korea
- Ilsun You, Hwankuk Kim, Taek-Young Youn, Francesco Palmieri, Igor V. Kotenko:
Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1544, Springer 2022, ISBN 978-981-16-9575-9
IoT and Cyber Security
- Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, Chuan-Tian Wu:
Secure LoRaWAN Root Key Update Scheme for IoT Environment. 3-15 - Borja Bordel, Ramón Alcarria:
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments. 16-29 - Daniel Gerbi Duguma, Philip Virgil Astillo, Yonas Engida Gebremariam, Bonam Kim, Ilsun You:
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System. 30-43 - Yueqing Gao, Yuting Shen, Huachun Zhou, Benhui Shi, Lulu Chen, Chu Du:
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability. 44-51 - Minhwan Kim, Hanmin Kim, Gyudong Park, Mye M. Sohn:
Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs. 52-64 - Yan Zhao, Ning Hu, Jincai Zou, Yuqiang Zhang:
A Secure Dispersed Computing Scheme for Internet of Mobile Things. 65-78 - Andrei D. Dakhnovich, Dmitrii A. Moskvin, Dmitry P. Zegzhda:
A Necessary Condition for Industrial Internet of Things Sustainability. 79-89
Blockchain Security
- Paresh Sajan Gharat, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag:
Future Applications of Blockchain in Education Sector: A Semantic Review. 93-106 - Monika Bharti, Rajesh Kumar, Sharad Saxena, Vishal Sharma:
A Resource-Blockchain Framework for Safeguarding IoT. 107-121 - Tianhong Zhang, Zejun Lan, Xianming Gao, Jianfeng Guan:
The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method. 122-138 - Yuyuan Shi, Xianming Gao, Jianfeng Guan:
Smart Contract-Based Personal Data Protection Framework: In Cross-App Advertising. 139-154 - Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, Li Su:
A Blockchain-Based Authentication Scheme for 5G Applications. 155-168
Digital Forensic and Malware Analysis
- Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli:
Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders. 171-194 - Wei Zong, Yang-Wai Chow, Willy Susilo, Jongkil Kim:
Trojan Attacks and Defense for Speech Recognition. 195-210 - Elena B. Aleksandrova, Maria A. Poltavtseva, Vadim S. Shmatov:
Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations. 211-221 - Rahul Sinha, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, Pradeep Singh:
Forensic Analysis of Fitness Applications on Android. 222-235 - Deepali Moad, Vikas Sihag, Gaurav Choudhary, Daniel Gerbi Duguma, Ilsun You:
Fingerprint Defender: Defense Against Browser-Based User Tracking. 236-247 - Alisa A. Vorobeva, Guldar Khisaeva, Danil Zakoldaev, Igor V. Kotenko:
Detection of Business Email Compromise Attacks with Writing Style Analysis. 248-262 - Yu-kyung Kim, Jemin Justin Lee, Myong-Hyun Go, Hae Young Kang, Kyungho Lee:
A Systematic Literature Review on the Mobile Malware Detection Methods. 263-288 - Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho, Younjai Park, Minkyu Park:
Forensic Analysis of Apple CarPlay: A Case Study. 289-300 - Konstantin E. Izrailov, Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces. 301-319
5G Virtual Infrastructure, Cryptography and Network Security
- Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao, Xin Huang:
Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP. 323-334 - Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, Weilin Wang:
A Blockchain-Based User Identity Authentication Method for 5G. 335-351 - Weilin Wang, Huachun Zhou, Kun Li, Zhe Tu, Feiyang Liu:
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G. 352-364 - Man Li, Yajuan Qin, Huachun Zhou:
A DDoS Detection Method with Feature Set Dimension Reduction. 365-378 - WonHaeng Lee, Keon Yun, MyungWoo Chung, JinHyeok Oh, HyunJun Shin, KwonKoo Kwak:
Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System Under 5G Environment. 379-395 - Xinda Cheng, Yixing Chen, Jincai Zou, Yuqiang Zhang, Ning Hu:
An Anonymous Communication System Based on Software Defined Architecture. 396-407 - Haoran Tao, Ning Ding, Tianhui Huang, Kehan Yu, Dongsheng Qian, Yan Luo, Yuyin Ma:
Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network. 408-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.