


default search action
MobiSec 2017: Jeju Island, Republic of Korea
- Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor V. Kotenko:
Mobile Internet Security - Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers. Communications in Computer and Information Science 971, Springer 2019, ISBN 978-981-13-3731-4 - Alexander Branitskiy
, Igor V. Kotenko
:
Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines. 1-16 - Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen:
Generating Dynamic Box by Using an Input String. 17-29 - Tianhan Gao, Xinyang Deng, Fanghua Geng:
SAAS: A Secure Anonymous Authentication Scheme for PMIPv6. 30-50 - Mookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyungho Lee:
FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device. 51-64 - Daniil A. Bashmakov
, Anatoliy G. Korobeynikov
, Alexey V. Sivachev
, Didier El Baz
, Dmitry Levshun
:
Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads. 65-82 - Alexey V. Sivachev
, Daniil A. Bashmakov
, Olga V. Mikhailishenko
, Anatoliy G. Korobeynikov
, Roland Rieke
:
Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains. 83-95 - Maxim Kolomeets
, Andrey Chechulin
, Igor V. Kotenko
, Martin Strecker
:
Voronoi Maps for Planar Sensor Networks Visualization. 96-109 - Marek R. Ogiela, Lidia Ogiela:
Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies. 110-119 - Chia-Hsin Cheng, Chia-Yao Hu:
Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems. 120-130 - Jong-Shin Chen, Chuan-Bi Lin, Cheng-Ying Yang, Yung-Fa Huang
:
An Efficient Facebook Place Information Extraction Strategy. 131-139 - Jyh-Horng Wen, Fang-Yu Chang, Yung-Fa Huang
, Hsing-Chung Chen, Zon-Yin Shae:
Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction. 140-150 - Tsung-Ju Lee, Shian-Shyong Tseng, Hsing-Chung Chen, Sung-Chiang Lin, Chiun-How Kao
:
A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing. 151-156 - Mengxin Liu, Jianfeng Guan
:
User Keystroke Authentication Based on Convolutional Neural Network. 157-168 - Rajesh Kumar, Mohd. Abuzar Sayeed
, Vishal Sharma
, Ilsun You:
An SDN-Based Secure Mobility Model for UAV-Ground Communications. 169-179

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.