000 | 04023nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-21311-3 | ||
003 | DE-He213 | ||
005 | 20240730172733.0 | ||
007 | cr nn 008mamaa | ||
008 | 221210s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031213113 _9978-3-031-21311-3 |
||
024 | 7 |
_a10.1007/978-3-031-21311-3 _2doi |
|
050 | 4 | _aTK5105.8857 | |
072 | 7 |
_aUT _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUT _2thema |
|
082 | 0 | 4 |
_a004.678 _223 |
245 | 1 | 0 |
_aAttacks and Defenses for the Internet-of-Things _h[electronic resource] : _b5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers / _cedited by Wenjuan Li, Steven Furnell, Weizhi Meng. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2022. |
|
300 |
_aX, 177 p. 65 illus., 46 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13745 |
|
505 | 0 | _aThe Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. . | |
520 | _aThis book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. | ||
650 | 0 |
_aInternet of things. _94027 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 1 | 4 |
_aInternet of Things. _94027 |
650 | 2 | 4 |
_aComputer Communication Networks. _9105267 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
700 | 1 |
_aLi, Wenjuan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105268 |
|
700 | 1 |
_aFurnell, Steven. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105269 |
|
700 | 1 |
_aMeng, Weizhi. _eeditor. _0(orcid) _10000-0003-4384-5786 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105271 |
|
710 | 2 |
_aSpringerLink (Online service) _9105274 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031213106 |
776 | 0 | 8 |
_iPrinted edition: _z9783031213120 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13745 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-21311-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88519 _d88519 |