Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers /

This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissio...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: You, Ilsun (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Chen, Hsing-Chung (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Sharma, Vishal (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Kotenko, Igor (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Communications in Computer and Information Science, 971
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Networks using the Graph-based Schemes for Combining the Support Vector Machines
  • Generating Dynamic Box by using an Input String
  • SAAS:A Secure Anonymous Authentication Scheme for PMIPv6
  • FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device
  • Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads
  • Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains
  • Voronoi Maps for planar sensor networks visualization
  • Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies
  • Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems
  • An Efficient Facebook Place Information Extraction Strategy
  • Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction
  • A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing
  • User Keystroke Authentication Based On Convolutional Neural Network
  • An SDN-based Secure Mobility Model for UAV-Ground Communications.