Attacks and Defenses for the Internet-of-Things: 8th International Conference, ADIoT 2025, Changzhou, China, November 14–16, 2025, Proceedings

Author:   Weizhi Meng ,  Moti Yung ,  Georgios Kambourakis
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032200792


Pages:   258
Publication Date:   22 May 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $129.35 Quantity:  
Pre-Order

Share |

Attacks and Defenses for the Internet-of-Things: 8th International Conference, ADIoT 2025, Changzhou, China, November 14–16, 2025, Proceedings


Overview

This book constitutes the referred proceedings of the 8th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2025, held in Changzhou, China, during November 14–16, 2025. The 14 papers included in these proceedings were carefully reviewed and selected from 42 submissions. These papers focus on both sides of IoT attacks and defenses, and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Full Product Details

Author:   Weizhi Meng ,  Moti Yung ,  Georgios Kambourakis
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032200792


ISBN 10:   3032200792
Pages:   258
Publication Date:   22 May 2026
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

CoRt: Cooperative Cross-Layer Routing for UAV Networks against Jamming Attacks.- A Privacy-Preserving Step-size Collection Against Poisoning Attacks for Federated Learning in IoT.- An Unsupervised Anomaly Detection Method for Traceability Graphs Based on Masked Autoencoders.- Zero-Shot Low-Light Image Enhancement.- Trajectory-Aware Routing for UAV Networks Traversing Multiple Jamming Regions.- Real-time Feedback-based Dynamic Reputation Assessment Protocol.- User Behaviour Analysis Based Intelligent Phishing Detection Systems: A Systematic Literature Review.- An Efficient and Trusted Authentication Scheme for Devices Supply Chain Based on Transitive Signature and Merkle Tree.- LVG-Net: Semi-Supervised Forecasting of Non-Stationary Time Series.- PBFT Consensus Optimization Algorithm for Dynamic Reputation and Clustering in Industrial Internet of Things.- Research on Emergency Response Attack Scenario Reconstruction Method Based on Steiner Trees.- Management Scheme for Secure Shared Services in Machine-as-a-Service Mode.- Research on Security Control in Data Circulation and Utilization: A Case Study of Trustworthy Data Space Construction.- RACE: Towards Automatic eBPF Program Synthesis via Retrieval-Augmented Generation and Chain-of-Thought Reasoning.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

MRGC26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List