Dohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee
{"title":"Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDN","authors":"Dohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee","doi":"10.1007/978-3-030-50399-4_42","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_42","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing an AR-Based Ubiquitous Learning System for a Smart Campus","authors":"S. Tseng, Shih-Nung Chen, Tsung-Yu Yang","doi":"10.1007/978-3-030-50399-4_39","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_39","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm Optimization","authors":"Yuyue Wang, Chen Chen, Baojiang Cui","doi":"10.1007/978-3-030-50399-4_36","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_36","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Asymmetry, Market Liquidity and Abnormal Returns","authors":"Yung-Shun Tsai, Shyh-Weir Tzang, Chun-ping Chang","doi":"10.1007/978-3-030-50399-4_50","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_50","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli, M. Takizawa
{"title":"A Fuzzy-Based Simulation System for Driving Risk Management in VANETs Considering Weather Condition as a New Parameter","authors":"Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli, M. Takizawa","doi":"10.1007/978-3-030-50399-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_3","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic","authors":"Hsing-Chung Chen, Mosiur Rahaman, Cahya Damarjati","doi":"10.1007/978-3-030-50399-4_9","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_9","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130172128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study and Realization of a Binary-Based Address Sanitizer Based on Code Injection","authors":"Yuchao Wang, Baojiang Cui","doi":"10.1007/978-3-030-50399-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_13","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seongmin Park, Bomin Choi, Youngkwon Park, Dowon Kim, Eunseon Jeong, Kangbin Yim
{"title":"Vestiges of Past Generation: Threats to 5G Core Network","authors":"Seongmin Park, Bomin Choi, Youngkwon Park, Dowon Kim, Eunseon Jeong, Kangbin Yim","doi":"10.1007/978-3-030-50399-4_45","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_45","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Architecture and Principles for Securing the IoT Systems","authors":"A. Gill, G. Beydoun, M. Niazi, Habib Ullah Khan","doi":"10.1007/978-3-030-50399-4_17","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_17","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim
{"title":"Design and Implementation of a Novel Testbed for Automotive Security Analysis","authors":"Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim","doi":"10.1007/978-3-030-50399-4_23","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_23","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}