- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Technology
- > electronics, electrical engineering, telecommunications
Full Description
This book constitutes the referred proceedings of the 8th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2025, held in Changzhou, China, during November 14-16, 2025.
The 14 papers included in these proceedings were carefully reviewed and selected from 42 submissions. These papers focus on both sides of IoT attacks and defenses, and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
Contents
CoRt: Cooperative Cross-Layer Routing for UAV Networks against Jamming Attacks.- A Privacy-Preserving Step-size Collection Against Poisoning Attacks for Federated Learning in IoT.- An Unsupervised Anomaly Detection Method for Traceability Graphs Based on Masked Autoencoders.- Zero-Shot Low-Light Image Enhancement.- Trajectory-Aware Routing for UAV Networks Traversing Multiple Jamming Regions.- Real-time Feedback-based Dynamic Reputation Assessment Protocol.- User Behaviour Analysis Based Intelligent Phishing Detection Systems: A Systematic Literature Review.- An Efficient and Trusted Authentication Scheme for Devices Supply Chain Based on Transitive Signature and Merkle Tree.- LVG-Net: Semi-Supervised Forecasting of Non-Stationary Time Series.- PBFT Consensus Optimization Algorithm for Dynamic Reputation and Clustering in Industrial Internet of Things.- Research on Emergency Response Attack Scenario Reconstruction Method Based on Steiner Trees.- Management Scheme for Secure Shared Services in Machine-as-a-Service Mode.- Research on Security Control in Data Circulation and Utilization: A Case Study of Trustworthy Data Space Construction.- RACE: Towards Automatic eBPF Program Synthesis via Retrieval-Augmented Generation and Chain-of-Thought Reasoning.



