Attacks and Defenses for the Internet-of-Things: 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings

Author:   Weizhi Meng ,  Moti Yung ,  Jun Shao
Publisher:   Springer International Publishing AG
Volume:   15397
ISBN:  

9783031855924


Pages:   169
Publication Date:   13 March 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $103.47 Quantity:  
Add to Cart

Share |

Attacks and Defenses for the Internet-of-Things: 7th International Conference, ADIoT 2024, Hangzhou, China, December 13–14, 2024, Proceedings


Add your own review!

Overview

This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024. The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Full Product Details

Author:   Weizhi Meng ,  Moti Yung ,  Jun Shao
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15397
ISBN:  

9783031855924


ISBN 10:   3031855922
Pages:   169
Publication Date:   13 March 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

An Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System.- An Empirical DNN Pruning Approach against Membership Inference Attacks.- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction.- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services.- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network.- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption.- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE.- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT.- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis.- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List