|
![]() |
|||
|
||||
OverviewThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing. Full Product DetailsAuthor: Joaquin Garcia-Alfaro , Shujun Li , Radha Poovendran , Hervé DebarPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2021 Volume: 399 Weight: 0.831kg ISBN: 9783030900212ISBN 10: 3030900215 Pages: 527 Publication Date: 04 November 2021 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsAnonymous Short Communications over Social Networks.- A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis.- ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits.- System-Wide Security for Offline Payment Terminals.- Horus: A Security Assessment Framework for Android Crypto Wallets.- Systems Security.- Leakuidator: Leaky resource attacks and countermeasures.- Jabbic lookups: a backend telemetry-based system for malware triage Octavian.- Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution.- Flowrider: Fast On-Demand Key Provisioning for CloudNetworks.- Mobile Security & Privacy.- Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith.- Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy.- HTPD: Secure and Flexible Message-Based Communication for Mobile Apps.- Smartphone Location Spoofing Attack in Wireless Networks.- IoT Security & Privacy 42 Compromised through Compression.- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |