


default search action
ADIoT 2022, Copenhagen, Denmark
- Wenjuan Li
, Steven Furnell
, Weizhi Meng
:
Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13745, Springer 2022, ISBN 978-3-031-21310-6 - Sebastian Renner, Enrico Pozzobon
, Jürgen Mottok:
The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers. 1-20 - Sebastian Renner, Enrico Pozzobon
, Jürgen Mottok:
Evolving a Boolean Masked Adder Using Neuroevolution. 21-40 - Chathuranga Sampath Kalutharage
, Xiaodong Liu
, Christos Chrysoulas
:
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). 41-50 - Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura
, Tsutomu Matsumoto:
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality. 51-71 - Roberto Román
, Rosario Arjona
, Iluminada Baturone
:
Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions (Extended Abstract). 72-83 - Pooria Madani
, Natalija Vlajic:
Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes: Comparative Study. 84-101 - Yanxiu Wuwang
, Gunther Schiefer
:
Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots. 102-121 - Idris Zakariyya
, Harsha K. Kalutarage
, M. Omar Al-Kadri
:
Resource Efficient Federated Deep Learning for IoT Security Monitoring. 122-142 - Felix Klement
, Henrich C. Pöhls
, Stefan Katzenbeisser:
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security. 143-164 - Roman Kryukov, Vladimir Zima, Elena Fedorchenko
, Evgenia Novikova, Igor V. Kotenko:
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract). 165-176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
