Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13745)
Included in the following conference series:
Conference proceedings info: ADIoT 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (10 papers)
Other volumes
-
Attacks and Defenses for the Internet-of-Things
Keywords
- malware and unwanted software
- IoT security and privacy
- IoT forensic techniques
- usable security and privacy
- vulnerability analysis and reverse engineering
- intrusion detection and prevention for IoT
- cyber intelligence techniques for IoT
- IoT infrastructures and mitigation techniques
- hardware security
- cyber physical systems security
- adversarial learning for IoT
- denial-of-service attacks for IoT
- security measurement for IoT
- IoT cyber crime
- authentication
- computer crime
- data security
- embedded systems
- Internet of Things (IoT)
- network security
About this book
The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions.
This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.Editors and Affiliations
Bibliographic Information
Book Title: Attacks and Defenses for the Internet-of-Things
Book Subtitle: 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers
Editors: Wenjuan Li, Steven Furnell, Weizhi Meng
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-21311-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-031-21310-6Published: 11 December 2022
eBook ISBN: 978-3-031-21311-3Published: 10 December 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 177
Number of Illustrations: 19 b/w illustrations, 46 illustrations in colour
Topics: Cyber-physical systems, IoT, Professional Computing, Computer Communication Networks, Computing Milieux, Cryptology, Mobile and Network Security