Pub Date : 2017-10-19DOI: 10.1007/978-981-13-3732-1_7
M. Kolomeets, A. Chechulin, Igor Kotenko, Martin Strecker
{"title":"Voronoi Maps for Planar Sensor Networks Visualization","authors":"M. Kolomeets, A. Chechulin, Igor Kotenko, Martin Strecker","doi":"10.1007/978-981-13-3732-1_7","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-19DOI: 10.1007/978-981-13-3732-1_14
R. Kumar, M. Sayeed, Vishal Sharma, I. You
{"title":"An SDN-Based Secure Mobility Model for UAV-Ground Communications","authors":"R. Kumar, M. Sayeed, Vishal Sharma, I. You","doi":"10.1007/978-981-13-3732-1_14","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_14","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121714077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-19DOI: 10.1007/978-981-13-3732-1_4
Mookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyungho Lee
{"title":"FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device","authors":"Mookyu Park, Jaehyeok Han, Junwoo Seo, Haengrok Oh, Kyungho Lee","doi":"10.1007/978-981-13-3732-1_4","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_4","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-19DOI: 10.1007/978-981-13-3732-1_6
A. Sivachev, Daniil A. Bashmakov, Olga V. Mikhailishenko, A. G. Korobeynikov, R. Rieke
{"title":"Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains","authors":"A. Sivachev, Daniil A. Bashmakov, Olga V. Mikhailishenko, A. G. Korobeynikov, R. Rieke","doi":"10.1007/978-981-13-3732-1_6","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-19DOI: 10.1007/978-981-13-3732-1_8
M. Ogiela, L. Ogiela
{"title":"Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies","authors":"M. Ogiela, L. Ogiela","doi":"10.1007/978-981-13-3732-1_8","DOIUrl":"https://doi.org/10.1007/978-981-13-3732-1_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_1
Yung-Fa Huang, Jyu-Wei Wang, J. Jenq, Hsing-Chung Chen, Chung-Hsin Hsu
{"title":"Performance on Clustering Routing for Naturally Deployed Wireless Sensor Networks","authors":"Yung-Fa Huang, Jyu-Wei Wang, J. Jenq, Hsing-Chung Chen, Chung-Hsin Hsu","doi":"10.1007/978-981-10-7850-7_1","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_1","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Security Assurance for Automotive Software Through ArchiMate","authors":"Nobuhide Kobayashi, Shuji Morisaki, Shuichiro Yamamoto","doi":"10.1007/978-981-10-7850-7_2","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_2","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117311613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_4
Yuh-Jye Wang, S. Tseng, Tsung-Yu Yang, Jui-Feng Weng
{"title":"Building a Frame-Based Cyber Security Learning Game","authors":"Yuh-Jye Wang, S. Tseng, Tsung-Yu Yang, Jui-Feng Weng","doi":"10.1007/978-981-10-7850-7_4","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_4","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_14
Xilong Mao, Yan Li, Yan Peng, Bao-kang Zhao
{"title":"Security Analysis Oriented Physical Components Modeling in Quantum Key Distribution","authors":"Xilong Mao, Yan Li, Yan Peng, Bao-kang Zhao","doi":"10.1007/978-981-10-7850-7_14","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_14","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_3
Tzu-Liang Kung, Hsing-Chung Chen
{"title":"A Generalized Data Inconsistency Detection Model for Wireless Sensor Networks","authors":"Tzu-Liang Kung, Hsing-Chung Chen","doi":"10.1007/978-981-10-7850-7_3","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114740533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}