


default search action
MobiSec 2022: Jeju Island, South Korea
- Ilsun You

, Hwankuk Kim
, Pelin Angin
:
Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1644, Springer 2023, ISBN 978-981-99-4429-3
5G Advanced and 6G Security
- Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu:

Attacks Against Security Context in 5G Network. 3-17 - Slawomir Kuklinski

, Jacek Wytrebowicz
:
A Systematic Approach to Security Management in the MonB5G Architecture. 18-32 - SeongHan Shin:

A Study on 5G Security Activities in Japan. 33-47 - Borja Bordel

, Ramón Alcarria
, Joaquin Chung
, Ivan Armuelles Voinov
:
Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks. 48-62 - Dowon Kim

, Ilsun You
, Seongmin Park
, SungMoon Kwon
:
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities. 63-81
AI for Security
- Rafal Kozik, Krzysztof Samp, Michal Choras, Marek Pawlicki:

Parameters Transfer Framework for Multi-domain Fake News Detection. 85-96 - Shuangxing Deng

, Man Li, Qi Guo, Huachun Zhou:
Security SFC Path Selection Using Deep Reinforcement Learning. 97-107 - Jeongbin Lee, Jaewoong Kang

, Mye M. Sohn
:
Data Sub-sampling Method for Developing Personalized Human Activity Model Based on Incremental Learning. 108-121 - Ouyang Liu

, Kun Li, Ziwei Yin, Huachun Zhou:
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base. 122-133 - Sandi Rahmadika

, Bayu Ramadhani Fajri
, Geovanne Farell
, Ahmaddul Hadi
, Khairi Budayawan
:
Recent Challenges in a New Distributed Learning Paradigm. 134-144
Cryptography and Data Security
- S. K. Karthika, Kunwar Singh:

Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 Bits. 147-164 - Akihiro Yamamura:

Blind Decryption and Private Information Delivery. 165-179 - Faizan Shoaib

, Yang-Wai Chow
, Elena Vlahu-Gjorgievska
, Chau Nguyen
:
Using Machine Learning for Detecting Timing Side-Channel Attacks in SDN. 180-194 - Yuzheng Yang

, Zhe Tu, Haoxiang Song, Huachun Zhou:
A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain. 195-206
Cyber Security
- Shashank Jaiswal, Vikas Sihag, Gaurav Choudhary

, Nicola Dragoni
:
DyBAnd: Dynamic Behavior Based Android Malware Detection. 209-219 - Kaiqiang Gao, Zhihui Wang, Juan Pan, Yuhang Pang, Lei Wei, Song Jiang:

The Enhancement of FlexE Network Performance Based on Network Calculus Theory. 220-230 - Youngsoo Kim

, Cheolhee Park, Yongyoon Shin:
Security Consideration of Each Layers in a Cloud-Native Environment. 231-242 - Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:

Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. 243-253
IoT Application and Blockchain Security
- Noriki Uchida, Shigeyuki Endo, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata:

Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System. 257-267 - Bingcheng Jiang, Qian He, Qi Pan, Mingliu He:

Blockchain-Based Terminal Access Control in Software Defined Network. 268-279 - Ruichi Yan, Guohua Tian, Shichong Tan, Zhengtao Jiang:

A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features. 280-291 - Ridong Huang, Jianmao Xiao, Jing Zhao, Jiangyu Wang, Yuhang Zhang, Siqi Chen, Jianyu Zou, Yuanlong Cao, Youliang Ma:

A Blockchain-Based Framework for Audio Copyright Deposition. 292-307 - Erukala Suresh Babu

, Aswani Devi Aguru
, Bhukya Padma
:
A Trust-Based Blockchain System for Secured Migration of BLE Devices in IoT Networks. 308-322 - Wen-Yu Lin, Min-Zheng Shieh

, Yi-Bing Lin
:
Web API Verifier for IoTtalk and Its Applications. 323-337

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














