dblp: MobiSec 2022 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


MobiSec 2022: Jeju Island, South Korea

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Ilsun You
, Hwankuk Kim
, Pelin Angin
:
Mobile Internet Security - 6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1644, Springer 2023, ISBN 978-981-99-4429-3
5G Advanced and 6G Security

Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu:
Attacks Against Security Context in 5G Network. 3-17

Slawomir Kuklinski
, Jacek Wytrebowicz
:
A Systematic Approach to Security Management in the MonB5G Architecture. 18-32

SeongHan Shin:
A Study on 5G Security Activities in Japan. 33-47

Borja Bordel
, Ramón Alcarria
, Joaquin Chung
, Ivan Armuelles Voinov
:
Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks. 48-62

Dowon Kim
, Ilsun You
, Seongmin Park
, SungMoon Kwon
:
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities. 63-81
AI for Security

Rafal Kozik, Krzysztof Samp, Michal Choras, Marek Pawlicki:
Parameters Transfer Framework for Multi-domain Fake News Detection. 85-96

Shuangxing Deng
, Man Li, Qi Guo, Huachun Zhou:
Security SFC Path Selection Using Deep Reinforcement Learning. 97-107

Jeongbin Lee, Jaewoong Kang
, Mye M. Sohn
:
Data Sub-sampling Method for Developing Personalized Human Activity Model Based on Incremental Learning. 108-121

Ouyang Liu
, Kun Li, Ziwei Yin, Huachun Zhou:
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base. 122-133

Sandi Rahmadika
, Bayu Ramadhani Fajri
, Geovanne Farell
, Ahmaddul Hadi
, Khairi Budayawan
:
Recent Challenges in a New Distributed Learning Paradigm. 134-144
Cryptography and Data Security
Cyber Security

Shashank Jaiswal, Vikas Sihag, Gaurav Choudhary
, Nicola Dragoni
:
DyBAnd: Dynamic Behavior Based Android Malware Detection. 209-219

Kaiqiang Gao, Zhihui Wang, Juan Pan, Yuhang Pang, Lei Wei, Song Jiang:
The Enhancement of FlexE Network Performance Based on Network Calculus Theory. 220-230

Youngsoo Kim
, Cheolhee Park, Yongyoon Shin:
Security Consideration of Each Layers in a Cloud-Native Environment. 231-242

Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. 243-253
IoT Application and Blockchain Security

Noriki Uchida, Shigeyuki Endo, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata:
Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning System. 257-267

Bingcheng Jiang, Qian He, Qi Pan, Mingliu He:
Blockchain-Based Terminal Access Control in Software Defined Network. 268-279

Ruichi Yan, Guohua Tian, Shichong Tan, Zhengtao Jiang:
A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features. 280-291

Ridong Huang, Jianmao Xiao, Jing Zhao, Jiangyu Wang, Yuhang Zhang, Siqi Chen, Jianyu Zou, Yuanlong Cao, Youliang Ma:
A Blockchain-Based Framework for Audio Copyright Deposition. 292-307

Erukala Suresh Babu
, Aswani Devi Aguru
, Bhukya Padma
:
A Trust-Based Blockchain System for Secured Migration of BLE Devices in IoT Networks. 308-322

Wen-Yu Lin, Min-Zheng Shieh
, Yi-Bing Lin
:
Web API Verifier for IoTtalk and Its Applications. 323-337

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






