This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could...
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc...
This book constitutes the proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015, held in Qufu, Shandong, China, in August 2015.
The 36 revised full papers presented together with 5 revised short papers and 42 invited papers were carefully reviewed and selected from 133 initial submissions. The papers present current trends, challenges, and state-of-the-art solutions related to various issues in wireless networks. Topics of interests include effective and efficient state-of-the-art algorithm design and analysis, reliable and...
This book constitutes the proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015, held in Qu...
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform....
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application...