LEADER 04147nam 22007575 450 001 9910987694403321 005 20250313115232.0 010 $a3-031-85593-0 024 7 $a10.1007/978-3-031-85593-1 035 $a(CKB)37877304500041 035 $a(DE-He213)978-3-031-85593-1 035 $a(MiAaPQ)EBC31958858 035 $a(Au-PeEL)EBL31958858 035 $a(EXLCZ)9937877304500041 100 $a20250313d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAttacks and Defenses for the Internet-of-Things $e7th International Conference, ADIoT 2024, Hangzhou, China, December 13?14, 2024, Proceedings /$fedited by Weizhi Meng, Moti Yung, Jun Shao 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (X, 169 p. 42 illus., 24 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15397 311 08$a3-031-85592-2 327 $aAn Efficient Edge based Privacy preserving Range Aggregation Scheme for Aging in Place System -- An Empirical DNN Pruning Approach against Membership Inference Attacks -- A Conflict Aware Active Automata Learning Approach for BLE Device Status Machine Construction -- Optimizing Indoor Network Element Layout for Enhanced Signal Coverage and Security in Location Based Services -- An Efficient Lattice Based Authentication Protocol for the Vehicular Ad Hoc Network -- An IoT Based Privacy Preserving Computer Aided Diagnosis System for Skin Cancer Using Federated Learning and Homomorphic Encryption -- GCFuzz An Intelligent Method for Generating IoT Protocols Test Cases using GAN with CVAE -- VRMDA Verifiable and Robust Multi subset Data Aggregation scheme in IoT -- Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis -- Singularization A New Approach to Design Block Ciphers for Resource Constrained Devices. 330 $aThis book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13?14, 2024. The 10 full papers were carefully reviewed and selected from 41 submissions.This conference focuses on both sides of IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15397 606 $aCooperating objects (Computer systems) 606 $aProgramming languages (Electronic computers) 606 $aComputer networks 606 $aComputers 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aCyber-Physical Systems 606 $aProgramming Language 606 $aComputer Communication Networks 606 $aComputing Milieux 606 $aCryptology 606 $aMobile and Network Security 615 0$aCooperating objects (Computer systems) 615 0$aProgramming languages (Electronic computers) 615 0$aComputer networks. 615 0$aComputers. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 14$aCyber-Physical Systems. 615 24$aProgramming Language. 615 24$aComputer Communication Networks. 615 24$aComputing Milieux. 615 24$aCryptology. 615 24$aMobile and Network Security. 676 $a621.38 702 $aMeng$b Weizhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShao$b Jun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910987694403321 996 $aAttacks and defenses for the internet-of-things$93089147 997 $aUNINA