Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Attacks and defenses for the interne...
~
ADIoT (Workshop) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Attacks and defenses for the internet-of-things = 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Attacks and defenses for the internet-of-things/ edited by Weizhi Meng, Moti Yung, Jun Shao.
Reminder of title:
7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024 : proceedings /
remainder title:
ADIoT 2024
other author:
Meng, Weizhi.
corporate name:
ADIoT (Workshop)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
x, 169 p. :ill., digital ;24 cm.
[NT 15003449]:
An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System -- An Empirical DNN Pruning Approach against Membership Inference Attacks -- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction -- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services -- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network -- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption -- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE -- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT -- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis -- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-85593-1
ISBN:
9783031855931
Attacks and defenses for the internet-of-things = 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024 : proceedings /
Attacks and defenses for the internet-of-things
7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024 : proceedings /[electronic resource] :ADIoT 2024edited by Weizhi Meng, Moti Yung, Jun Shao. - Cham :Springer Nature Switzerland :2025. - x, 169 p. :ill., digital ;24 cm. - Lecture notes in computer science,153971611-3349 ;. - Lecture notes in computer science ;15397..
An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System -- An Empirical DNN Pruning Approach against Membership Inference Attacks -- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction -- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services -- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network -- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption -- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE -- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT -- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis -- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.
This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13-14, 2024. The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
ISBN: 9783031855931
Standard No.: 10.1007/978-3-031-85593-1doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Attacks and defenses for the internet-of-things = 7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024 : proceedings /
LDR
:02682nmm a2200373 a 4500
001
2408769
003
DE-He213
005
20250313115232.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031855931
$q
(electronic bk.)
020
$a
9783031855924
$q
(paper)
024
7
$a
10.1007/978-3-031-85593-1
$2
doi
035
$a
978-3-031-85593-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJF
$2
bicssc
072
7
$a
GPFC
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TJF
$2
thema
072
7
$a
GPFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A235 2024
111
2
$a
ADIoT (Workshop)
$n
(7th :
$d
2024 :
$c
Hangzhou, China)
$3
3781563
245
1 0
$a
Attacks and defenses for the internet-of-things
$h
[electronic resource] :
$b
7th International Conference, ADIoT 2024, Hangzhou, China, December 13-14, 2024 : proceedings /
$c
edited by Weizhi Meng, Moti Yung, Jun Shao.
246
3
$a
ADIoT 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
x, 169 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15397
505
0
$a
An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System -- An Empirical DNN Pruning Approach against Membership Inference Attacks -- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction -- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services -- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network -- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption -- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE -- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT -- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis -- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.
520
$a
This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13-14, 2024. The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Internet of things
$x
Security measures
$v
Congresses.
$3
3221315
650
1 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Programming Language.
$3
3538935
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Meng, Weizhi.
$3
3453375
700
1
$a
Yung, Moti.
$3
840234
700
1
$a
Shao, Jun.
$3
696906
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15397.
$3
3781564
856
4 0
$u
https://doi.org/10.1007/978-3-031-85593-1
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514267
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login