Attacks and Defenses for the Internet-of-Things

Attacks and Defenses for the Internet-of-Things portes grátis

Attacks and Defenses for the Internet-of-Things

8th International Conference, ADIoT 2025, Changzhou, China, November 14-16, 2025, Proceedings

Yung, Moti; Meng, Weizhi; Kambourakis, Georgios

Springer Nature Switzerland AG

04/2026

218

Mole

Inglês

9783032200792

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
CoRt: Cooperative Cross-Layer Routing for UAV Networks against Jamming Attacks.- A Privacy-Preserving Step-size Collection Against Poisoning Attacks for Federated Learning in IoT.- An Unsupervised Anomaly Detection Method for Traceability Graphs Based on Masked Autoencoders.- Zero-Shot Low-Light Image Enhancement.- Trajectory-Aware Routing for UAV Networks Traversing Multiple Jamming Regions.- Real-time Feedback-based Dynamic Reputation Assessment Protocol.- User Behaviour Analysis Based Intelligent Phishing Detection Systems: A Systematic Literature Review.- An Efficient and Trusted Authentication Scheme for Devices Supply Chain Based on Transitive Signature and Merkle Tree.- LVG-Net: Semi-Supervised Forecasting of Non-Stationary Time Series.- PBFT Consensus Optimization Algorithm for Dynamic Reputation and Clustering in Industrial Internet of Things.- Research on Emergency Response Attack Scenario Reconstruction Method Based on Steiner Trees.- Management Scheme for Secure Shared Services in Machine-as-a-Service Mode.- Research on Security Control in Data Circulation and Utilization: A Case Study of Trustworthy Data Space Construction.- RACE: Towards Automatic eBPF Program Synthesis via Retrieval-Augmented Generation and Chain-of-Thought Reasoning.
Malware and Unwanted Software;Vulnerability Analysis and Reverse Engineering;IoT Security and Privacy;IoT Forensic Techniques;Usable Security and Privacy;Intrusion Detection and Prevention for IoT;Cyber Intelligence Techniques for IoT;IoT Infrastructures and Mitigation Techniques;Hardware Security;Cyber Physical Systems Security;Adversarial Learning for IoT;IoT Cyber Crime;Denial-of-Service Attacks for IoT;Security Measurement for IoT