Amazon cover image
Image from Amazon.com

Attacks and Defenses for the Internet-of-Things [electronic resource] : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 13745Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2022Edition: 1st ed. 2022Description: X, 177 p. 65 illus., 46 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031213113
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.678 23
LOC classification:
  • TK5105.8857
Online resources:
Contents:
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. .
In: Springer Nature eBookSummary: This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. .

This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in