Mobile Internet Security: Second International Symposium, Mobisec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Pa » książka
Networks using the Graph-based Schemes for Combining the Support Vector Machines.- Generating Dynamic Box by using an Input String.- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6.- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device.- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads.- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains.- Voronoi Maps for planar sensor networks visualization.- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies.- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems.- An Efficient Facebook Place Information Extraction Strategy.- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction.- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing.- User Keystroke Authentication Based On Convolutional Neural Network.- An SDN-based Secure Mobility Model for UAV-Ground Communications.