Attacks and Defenses for the Internet-of-Things
Springer International Publishing (Verlag)
978-3-031-21310-6 (ISBN)
The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions.
This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers.- Evolving a Boolean Masked Adder Using Neuroevolution.- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty.- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions.- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes.- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots.- Resource Efficient Federated Deep Learning for IoT Security Monitoring.- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security.- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation.
Erscheinungsdatum | 13.12.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 177 p. 65 illus., 46 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 296 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Technik ► Elektrotechnik / Energietechnik | |
Schlagworte | adversarial learning for IoT • authentication • computer crime • cyber intelligence techniques for IoT • Cyber Physical Systems Security • Data Security • denial-of-service attacks for IoT • Embedded Systems • hardware security • Internet of Things (IoT) • intrusion detection and prevention for IoT • IoT cyber crime • IoT forensic techniques • IoT infrastructures and mitigation techniques • IoT security and privacy • malware and unwanted software • Network Security • security measurement for IoT • Usable Security and Privacy • vulnerability analysis and reverse engineering |
ISBN-10 | 3-031-21310-6 / 3031213106 |
ISBN-13 | 978-3-031-21310-6 / 9783031213106 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich