LEADER 04114nam 22008055 450 001 9910634042903321 005 20251105082011.0 010 $a9783031213113 010 $a3031213114 024 7 $a10.1007/978-3-031-21311-3 035 $a(MiAaPQ)EBC7156587 035 $a(Au-PeEL)EBL7156587 035 $a(CKB)25657392700041 035 $a(DE-He213)978-3-031-21311-3 035 $a(PPN)268647453 035 $a(EXLCZ)9925657392700041 100 $a20221210d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAttacks and Defenses for the Internet-of-Things $e5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers /$fedited by Wenjuan Li, Steven Furnell, Weizhi Meng 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (187 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13745 311 08$aPrint version: Li, WenJuan Attacks and Defenses for the Internet-Of-Things Cham : Springer,c2023 9783031213106 320 $aIncludes bibliographical references and index. 327 $aThe Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers -- Evolving a Boolean Masked Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty -- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality -- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions -- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes -- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots -- Resource Efficient Federated Deep Learning for IoT Security Monitoring -- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security -- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. . 330 $aThis book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode. The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13745 606 $aInternet of things 606 $aComputer networks 606 $aComputers 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aSoftware engineering 606 $aInternet of Things 606 $aComputer Communication Networks 606 $aComputing Milieux 606 $aCryptology 606 $aMobile and Network Security 606 $aSoftware Engineering 615 0$aInternet of things. 615 0$aComputer networks. 615 0$aComputers. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aSoftware engineering. 615 14$aInternet of Things. 615 24$aComputer Communication Networks. 615 24$aComputing Milieux. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aSoftware Engineering. 676 $a929.605 676 $a004.678 702 $aLi$b Wenjuan 702 $aFurnell$b Steven 702 $aMeng$b Weizhi 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910634042903321 996 $aAttacks and defenses for the internet-of-things$93089147 997 $aUNINA