Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers

Author:   Ilsun You ,  Hsing-Chung Chen ,  Vishal Sharma ,  Igor Kotenko
Publisher:   Springer Verlag, Singapore
Edition:   1st ed. 2019
Volume:   971
ISBN:  

9789811337314


Pages:   181
Publication Date:   30 December 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers


Add your own review!

Overview

This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.

Full Product Details

Author:   Ilsun You ,  Hsing-Chung Chen ,  Vishal Sharma ,  Igor Kotenko
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
Edition:   1st ed. 2019
Volume:   971
Weight:   0.454kg
ISBN:  

9789811337314


ISBN 10:   9811337314
Pages:   181
Publication Date:   30 December 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Networks using the Graph-based Schemes for Combining the Support Vector Machines.- Generating Dynamic Box by using an Input String.- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6.- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device.- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads.- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains.- Voronoi Maps for planar sensor networks visualization.- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies.- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems.- An Efficient Facebook Place Information Extraction Strategy.- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction.- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing.- User Keystroke Authentication Based On Convolutional Neural Network.- An SDN-based Secure Mobility Model for UAV-Ground Communications.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List