MOBISEC 2025: THE 9TH INTERNATIONAL CONFERENCE ON MOBILE INTERNET SECURITY
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

-
- dynamic tuner
- Firmware Update
- IoT Anomaly detection
- Low Earth Oribt
- Over-the-Air Transmission
- pareto front optimization
- power saving
- Satellite Communication
5
5G
5G Authentication and Key Agreement (5G-AKA)
5G Core (5GC)
5G NAS
5G Network
5G Networks
5G Private Network
5G Security
5G-AKA
5G/6G network
6
6G network
6G Networks
A
Access and Mobility Management Function (AMF)
Access Control
Account Sharing
ACK-bit Voltage
Activation-Guided Fuzzing
Active defense
Adapter Fusion
Adapter-based Parameter-Efficient Transfer Learning
Adaptive
Adaptive Guard Interval
Adaptive multi-link response
Adaptive Scheduling
Additive homomorphism
Adjacent Channel Interference (ACI)
advanced persistent threats
Adversarial Attack
Adversarial Attack Defense
Adversarial Attacks
Adversarial Perturbations
Adversarial Robustness
Agentic AI
Agentic AI Threats
agents
AI
AI Agent Security
AI governance
AI risk management
AI Risk Management Framework (AI RMF 1.0)
AI risk taxonomy
AI Safety
AI Safety and Security
AI Security
AI-based Security Operations
AI-based Threat Simulation
AI-driven cyber threats
AI-driven Cybersecurity Framework
AIML
Air-gap attack
Air-gapped system
Algorithm
Allowed-Only
Allowed-only permission detection
Allowed-Used
Ambient
Anomaly Detection
Anomaly Detection for Secure Streaming
anomaly packet detection
Anonymity
Anonymous Authentication
Antivirus evaluation
Application to a Commercial Private 5G Network
Artificial intelligence (AI)
AST
Athena
Attack Detection
Attack Graph
Attack Path
Attack Taxonomy
Attribute Authentication
Attribute Inference Attack
Attribute Revocation
Attribute-based encryption
Authenticated key exchange
Autoencoder
Automated formal verification
Automated least privilege enforcement
Automated Threat Scenario Generation
Automatic Exposure Control (AEC)
Automotive
Automotive Cybersecurity
Automotive Security
Autonomous Driving
Autonomous Robots
Autonomous Vehicle
AVN(Audio Video Navigation)
AWS
AWS Athena
B
Backdoor Embedding
Basic safety message
Basic Safety Message (BSM)
Beacon Synchronization
Behavioural anti-malware
Binary Code Analysis
Binary Lifting
Biometric Authentication
Biometric information
Block Korkine–Zolotarev
Blockchain
Bluetooth BR/EDR
C
cahce
Camera Attack
Camera Sensor Security
CAN bus
Capture the Flag (CTF)
CDS
Cellular Networks
Cellular Security
Chain of Custody
chameleon hash
Chameleon Hash Function (CH)
channel-state information
CICFlowMeter
CICIoMT2024
Ciphertext Policy
Circuit
Circuit Breaker
Circuit breaking
Circuit optimization
classification
CLIP
Clock Drift
cloud native applications
Cloud storage
CloudTrail
CNN model
Code Transformation
Cognitive Security
Column vector
Compliance
Congestion Control
constrained Markov decision process (CMDP)
Constraint Standardization
Content Popularity Prediction
Continual Learning
Continuous Authentication
Control Correlation Identifier (CCI)
Controller Area Network (CAN)
Cookie
Cooperative detection
Course Design Analysis
covert communication
CPS Security
CRA
Cross Domain Solution
Cross Domain Solution (CDS)
Cross-artifact
Cross-Domain Solution
Cross-sector policy alignment
Cryptanalysis
Cryptography
Cryptography Engineering
CTI
Cumulative Malicious User Injection
Curriculum learning
CuSum algorithm
Cyber Attack Scenarios
Cyber Attack Simulation
Cyber Defense Training
Cyber Security
Cyber Threat Intelligence (CTI)
Cyberattack Mitigation
Cybersecurity
Cybersecurity policy response model
Cybersecurity Training
D
Data Anonymization
Data Exfiltration
Data Governance
Data integrity
Data Poisoning Attacks
Data tampering
Data-at-rest encryption
DDoS
Decision-Making
Deep Learning
Deep Neural Network
Deep Optical Imaging
Deep Q-Learning
Deep Reinforcement Learning
Deepfake Datasets
Deepfake incident case study
defense network
deniable encryption
Device Binding
DevSecOps
Differential Privacy
Digital Evidence
Digital Forensics
Digital Signature
digital signatures
Digital Trace Analysis
Digital Watermark
Digital watermarking
direct interconnection
Disaster Information System
Disaster Response
Discrete Wavelet Transform
DNN Model
Dolev-Yao Model
Domain-specific features
DoS
DPKT
Drain Parser
Drone security
Dynamic Membership Management
Dynamic Memory Allocation
E
Early Warning System for Heavy Rainfall
eBPF-XDP
ECDIS
ECG
Edge Computing
edge-cloud
EDHOC
Efficiency Optimization
Elliptic Curve Cryptography
Embedded Security
ENC Update
encrypted flow
Encrypted Network Traffic
Encrypted Traffic Classification
Encryption heuristics
Energy Efficiency
Energy-Aware Computing
Entropy analysis
Error-driven strategies
eSIM
ET-BERT
Ethical and Trustworthy AI
Event Data Recorder (EDR)
Explainable Artificial Intelligence (XAI)
Exponentially Weighted Moving Average (EWMA)
F
Face–Skeleton–Voice Fusion
Facial Beauty Prediction
Fail-Operational
Fail-Safe
Fairness
fake base station
False Base Station
False positives in security software
Fault Attack
Feature Extraction
Federated Learning
Federated-Inspired Coordination
Firewalling
Flow Optimization
flow sequences
forensic
Forensic framework
Forgery Detection Method
formal analysis
Formal security verification
Formal Verification
Free Floating Space Robots
Frequency
Frequency Hopping
Fully Homomorphic Encryption (FHE)
Fuzzy Extractor
G
Gemini
Generative AI
Generative Remediation
Genetic Algorithm
Google Gemini
Google Takeout
Google Workspace
Government and corporate AI regulations
GPS security
Grover's algorithm
H
H-Risk
HDFS Dataset
Hidden service
High-level assurance
Homomorphic encryption
Hybrid Cryptographic Protocols
Hybrid scheme
I
IaC
IAM and Cognito
IAM privilege validation
ID-Based Signature
Identity-Based Encryption
IDS
IETF LAKE WG
IKEv2
Illegal Streaming Sites
Implementation
Implicit Authentication
In-Vehicle IDS
In-Vehicle Network (IVN)
In-vehicle Network Security
incompressible signatures
Incremental Learning
Industrial Control System
Industrial control systems
Industrial Control Systems Security
Industrial Sensor Data
Inference Efficiency
information leakage monitoring
Infrastructure as Code(IaC)
Input Filtering
Integrity
Integrity Verification
Intellectual Property
intent-based networking
intent-based resource allocation
International Training Course
Internet of Things
intruder detection
Intrusion Detection
Intrusion Detection System
Intrusion Detection System (IDS)
Invisible Watermark
IoMT
IoMT (Internet of Medical Things)
IoT
IoT security
IoT--Edge Continuum
IPFS (Inter-Planetary File System)
IPS
Isogeny-Based Cryptography
Isolation Forest
Istio
ITU-T SG17
IWOA
J
Jailbreak
Jailbreak Attacks
Jailbreak Template Generation
Jamming attack detection
JSON Web Tokens (JWTs)
K
Kalman Filter
Key Encapsulation Mechanism
Key management mechanism
Known IV attack
Kubernetes
L
L1/L2 Plausibility Checks
Lambda-based log analysis
Lane Detection
Large Language Model
Large language model (LLM)
Large Language Models
Large Language Models(LLM)
Large Language Models(LLMs)
Latency Reduction
Lattice attack
Lattice-Based Cryptography
Learning With Errors
Legal
Leo Satellite
lexicographic optimization
LiDAR Security
LightGBM
Lightweight Cryptography
Lightweight Security
LLM
LLM agent
LLM Jailbreak
LLM safety
LLM Security
LLM Supply Chain Attack
LLVM IR
Local LLMs
Log Parsing
Logistic regression
Low earth orbit (LEO) satellite communications
LSTM-Autoencoder
M
Machine Learning
Machine Learning-based Misbehavior Detection Systems (ML-MDS)
Malware Analysis
Malware Creation
management control mechanism
Maritime Cybersecurity
Markov Matrix
Matrix
Maude Strategy
Meet-in-the-Middle
Memory Vulnerability Detection
Message Authentication Code (MAC)
Metadata
Military Network
Mitigation Strategy
MITRE ATT&CK
MITRE ATT&CK Framework
MITRE ATT&CK Techniques Simulation
MITRE D3FEND
ML
ML-KEM
MLS CDS
Mobile Edge Computing
Mobile Forensics
mobile network
Mobile Security
Model Context Protocol
model watermark
Model-based Testing
model-stealing attack
Multi-Agent
Multi-cloud
Multi-Condition Backdoor
multi-domain network intent resolution
Multi-factor Authentication
Multi-Keyword Search
Multi-Link Operation (MLO)
multi-modal learning
Multi-modal Model
Multi-policy Enforcement
Multi-Resolution Feature Fusion
Multi-User Detection
Multimodal Biometrics
Multiple Authorities
Multiplicative Complexity reduction
Multivariate Quadratic Signature
Music Recommendation
N
NAS Count
Natural Language Inference
Near-RT
Network
network behavior analysis
Network communtication protocol
Network Digital Twin
Network Security
Network Separation
Network Slicing
Network Traffic Data
Neural Network Analysis
NFT
NG Application Protocol (NGAP)
NLP for Systems
Non-stored
Noninvasive glucose monitoring
NTN
Nuclear Nonproliferation and Security
O
Obfuscation
object detection
Obstacle Avoidance
offloading
On-device AI
On-Device AI Model
Open RAN
Open-Source Software
OpenAI
Optimization
OQS-TLS
Orchestration
OSCAL
OSS
OT–IT Convergence Vulnerability
Overlapping Basic Service Set
P
P-frame
Panama Stream Cipher
Parameter Tampering Attack
Partial Homomorphic Encryption (PHE)
Passport.js
Path Orchestration
Pattern Matching
PBFT
Pedersen commitment
Perfect forward secrecy
Persona Conditioning
Persona Governance
Phishing
Phishing detection
Physical Layer Security
Poisoning Attack
Policy as Code
Policy as Code(PaC)
Policy requirements and control mapping
PoLP
Portal-Resource Model
Post-Quantum
Post-Quantum Cryptography
Post-Quantum Cryptography (PQC
Post-Quantum Cryptography (PQC)
post-quantum encryption
PoW
power allocation
PPG
Preamble Protection
Preemptive Framework
Prefetching
Principal Component Analysis(PCA)
Privacy
Privacy At Ransom Testbed (PART)
Privacy forwarding
privacy preservation
Privacy Protection
Privacy-enhancing technologies (PETs)
Privacy-free
privacy-preserving
Privacy-preserving anomaly detection
Privacy-Preserving Security Monitoring
Private 5G
Private 5G Network
Private 5G Security Assesement Framework
process file system
Prompt engineering
Protocol
Protocol Compliance
Protocol fuzzing
Protocol vulnerability
provenance analysis
Proverif
Proxy Re-Encryption
Pseudo-Labeling
Public-key Cryptography
Q
Qiskit
QR-code authentication
Quantum
Quantum entanglement
Quantum Key Distribution (QKD)
Quantum Resistance
Quantum security
Qwen
R
Rank-1 Constraint System
Ransomware detection
Rate-Distorion Theory
Real-time Defense
Real-time SNS alert
Real-time speech protection
Recommendation Systems
Reconstruction attack
Red-Teaming
Regulatory compliance
Regulatory sandbox
Reinforcement Learning Security
Remote SIM Provisioning
Requirement Relationship Analysis
Resilience
RESTful API
Retransmission
Risk-based Authentication
Roaming
Robotic Manipulation
routing
S
Saliency-Weighted Exposure Control (DSWEC)
Satellite
Satellite Communication
Satellite-Terrestrial Integrated Network
SBOM
Schnorr ID Protocol
Searchable Encryption
Secondary Data Transmission
Secure Communication Protocol
Secure deletion
Secure Information Exchange
Secure Simple Pairing
Security
security applications
Security Architecture
Security as a Service
Security Education
Security for AI
Security Governance
Security Patching
Security Requirement
Security Service Function
Security System Operation
Security usability conflicts
Self-HarmLLM
Semantic Caching
Semantic consistency
Semantic Vulnerability Detection
Semi-Supervised Learning
Sensitive Attribute
Sequential Recommendation
Service Mesh
Service Orchestration
Service-Based Architecture
Session Security
Shamir's Secret Sharing
Shared Multimodal Encoder
Shipboard Cyberattack
Short-Term Event Detection
side-channel attack
Sidecar
Signal Overshadowing
Signal Reconstruction
signature leak
Simulation Analysis
Slope-based SAD
Small Language Model (SLM)
Smart Irrigation
Software Vulnerability
Software-Defined Network
SOME/IP
Specification-based Cellular
SpikeDecay Model
Split
Spoofing Attack Detection
Stable Diffusion
Stake voting system
Steganalysis
Steganalysis Residual Network
Steganography
STIX
Strand Space
Stream Cipher
Strengthening ZTA with CDS
Structure-Aware Fuzzing
Succinct Proofs
Supply chain
Supply Chain Attacks
Supply Chain Security
Syntax mutation
System Prompt
system security
T
Tabular Data
Task Offloading
TBD
TBDD
TBDDD
Telematics
Template Mining
Temporal Attack Dynamics
Terraform
Testbed
Testbed Validation
Testimony Reliability
Text-to-Image
Threat classification and mapping model
threat detection
Time-Bound Access Control
Time-Indexed Key Management
Time-to-Collision (TTC)
TLS
TLS 1.3 Integration
TLS protocol
TLS verification
Tool Development
Tor
traceability attack
Transfer CDS
Transmit Power Control
Transparency
Trusted Execution Environments (TEEs)
U
UAV Swarm Networks
UE Registration
Unified risk categorization framework
unmanned aerial vehicle (UAV) cooperative jamming
UPPAAL Model Checking
Usable-Security
V
V2X
VANET
Vehicle-to-Everything (V2X)
Verifiability
Vessel Cyber Resilience
Video processing
Video Watermarking
virtual machine monitor
Virtualization
Vision-Language-Action (VLA)
Visualization
Visualization System
Voice cloning defense
voting protocol
Vulnerability Detection
Vulnerability Identification
W
Wake-up Time Correction
Web applications
Web artifacts
Weight Estimation
White-box Cryptography
Wi-Fi sensing obfuscation
Wireless Communication Efficiency
Wireless Network
Wireless networks
Wireless security
Wireless Sensor Networks
X
X.509 certificate
xApp
Y
YOLO
Z
Zero Knowledge (ZK) rollups
Zero Trust
Zero Trust Architecture
Zero Trust Architecture (ZTA)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-knowledge proof
Zero-Knowledge Proofs
Zero-shot
ZTA 5 Pillars