


default search action
MobiSec 2017: Jeju Island, Republic of Korea
- Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor V. Kotenko:

Mobile Internet Security - Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers. Communications in Computer and Information Science 971, Springer 2019, ISBN 978-981-13-3731-4 - Alexander Branitskiy

, Igor V. Kotenko
:
Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines. 1-16 - Jia-Jia Liu, Yi-Li Huang, Fang-Yie Leu, Xing-You Pan, Li-Ren Chen:

Generating Dynamic Box by Using an Input String. 17-29 - Tianhan Gao, Xinyang Deng, Fanghua Geng:

SAAS: A Secure Anonymous Authentication Scheme for PMIPv6. 30-50 - Mookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyungho Lee:

FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device. 51-64 - Daniil A. Bashmakov

, Anatoliy G. Korobeynikov
, Alexey V. Sivachev
, Didier El Baz
, Dmitry Levshun
:
Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads. 65-82 - Alexey V. Sivachev

, Daniil A. Bashmakov
, Olga V. Mikhailishenko
, Anatoliy G. Korobeynikov
, Roland Rieke
:
Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains. 83-95 - Maxim Kolomeets

, Andrey Chechulin
, Igor V. Kotenko
, Martin Strecker
:
Voronoi Maps for Planar Sensor Networks Visualization. 96-109 - Marek R. Ogiela, Lidia Ogiela:

Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies. 110-119 - Chia-Hsin Cheng, Chia-Yao Hu:

Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems. 120-130 - Jong-Shin Chen, Chuan-Bi Lin, Cheng-Ying Yang, Yung-Fa Huang

:
An Efficient Facebook Place Information Extraction Strategy. 131-139 - Jyh-Horng Wen, Fang-Yu Chang, Yung-Fa Huang

, Hsing-Chung Chen, Zon-Yin Shae:
Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction. 140-150 - Tsung-Ju Lee, Shian-Shyong Tseng, Hsing-Chung Chen, Sung-Chiang Lin, Chiun-How Kao

:
A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing. 151-156 - Mengxin Liu, Jianfeng Guan

:
User Keystroke Authentication Based on Convolutional Neural Network. 157-168 - Rajesh Kumar, Mohd. Abuzar Sayeed

, Vishal Sharma
, Ilsun You:
An SDN-Based Secure Mobility Model for UAV-Ground Communications. 169-179

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














