


default search action
16th NSS 2022: Denarau Island, Fiji
- Xingliang Yuan

, Guangdong Bai
, Cristina Alcaraz, Suryadipta Majumdar
:
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13787, Springer 2022, ISBN 978-3-031-23019-6
AI for Network Security
- Huihui Gong

, Siqi Ma
, Seyit Camtepe
, Surya Nepal
, Chang Xu
:
Vulnerability Detection Using Deep Learning Based Function Classification. 3-22 - Keelan Evans, Alsharif Abuadbba

, Tingmin Wu
, Kristen Moore
, Mohiuddin Ahmed
, Ganna Pogrebna
, Surya Nepal
, Mike Johnstone
:
RAIDER: Reinforcement-Aided Spear Phishing Detector. 23-50 - Yunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan:

Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning. 51-65 - Stuart W. Hall, Amin Sakzad, Sepehr Minagar:

A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics. 66-85 - Wei Hong

, Jiao Yin
, Mingshan You
, Hua Wang
, Jinli Cao
, Jianxin Li
, Ming Liu
:
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. 86-102
Network Security
- Siqi Xia

, Sutharshan Rajasegarar
, Christopher Leckie
, Sarah M. Erfani
, Jeffrey Chan
:
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. 105-119 - Kurt Friday, Elias Bou-Harb, Jorge Crichigno:

A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches. 120-139 - Eric Ficke

, Raymond M. Bateman
, Shouhuai Xu
:
Reducing Intrusion Alert Trees to Aid Visualization. 140-154 - Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens:

Attacker Attribution via Characteristics Inference Using Honeypot Data. 155-169 - Xinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo:

Detecting Contradictions from CoAP RFC Based on Knowledge Graph. 170-189
Mobile Security
- Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar:

A First Look at Android Apps' Third-Party Resources Loading. 193-213 - Shuang Zhao

, Jincheng Zhong
, Shuhui Chen
, Jianbing Liang
:
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset. 214-232 - Bo Yang

, Yanchao Zhang, Dong Tong:
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices. 233-248 - Mohamed Taoufiq Damir

, Tommi Meskanen, Sara Ramezanian
, Valtteri Niemi:
A Beyond-5G Authentication and Key Agreement Protocol. 249-264
IoT Security
- Xinbo Ban

, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
:
A Survey on IoT Vulnerability Discovery. 267-282 - Jiani Fan

, Lwin Khin Shar
, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam:
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. 283-304 - Tianqi Zhou, Wenying Zheng, Haowen Tan:

An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. 305-318 - Bhagyashri Tushir

, Yuhong Liu
, Behnam Dezfouli
:
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection. 319-334 - Lei Shi, Shanti Krishnan

, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. 335-353
Privacy-Preserving Machine Learning Protocols and Systems
- Han Xu

, Priyadarsi Nanda
, Jie Liang
, Xiangjian He
:
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning. 357-373 - Yang Hong, Lisong Wang, Weizhi Meng

, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang:
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication. 374-386 - Junwei Luo

, Xun Yi
, Fengling Han
, Xuechao Yang
, Xu Yang:
An Efficient Clustering-Based Privacy-Preserving Recommender System. 387-405 - Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu

, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. 406-425
Privacy-Preserving Networked Systems and Protocols
- Hongcheng Xie

, Zizhuo Chen
, Yu Guo, Qin Liu
, Xiaohua Jia:
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server. 429-442 - Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui, Fei Zhu

:
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare. 443-458 - Bo Zhang, Helei Cui

, Yaxing Chen, Xiaoning Liu, Zhiwen Yu, Bin Guo:
Enabling Secure Deduplication in Encrypted Decentralized Storage. 459-475 - Mengwei Yang, Chungen Xu

, Pan Zhang:
Geometric Range Searchable Encryption with Forward and Backward Security. 476-495
Blockchain Security
- Yining Xie, Xin Kang

, Tieyan Li
, Cheng-Kang Chu
, Haiguang Wang:
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach. 499-513 - Fokke Heikamp

, Lei Pan
, Rolando Trujillo-Rasua
, Sushmita Ruj
, Robin Doss
:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. 514-523 - Zhuang Zhou, Cheng Tan

, Shiyun Liu, Rongwei Yu, Siwei Wu
, Shengwu Xiong
:
BSB: Bringing Safe Browsing to Blockchain Platform. 524-543
Blockchain-Powered Systems
- Mengling Liu

, Man Ho Au
:
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. 547-560 - Ru Ray Raymond Chao, Joseph K. Liu, Kai Su:

Blockchain Based Regulatory Technology Deployment for Real Estate Transaction. 561-579 - Zoey Ziyi Li

, Joseph K. Liu
, Jiangshan Yu
, Dragan Gasevic
, Wayne Yang:
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment. 580-597 - Ning Xi, Yajie Li, Jin Liu:

Decentralized Access Control for Secure Microservices Cooperation with Blockchain. 598-614 - Aditya Pribadi Kalapaaking

, Ibrahim Khalil
, Mohammad Saidur Rahman
, Abdelaziz Bouras
:
Blockchain-Based Access Control for Secure Smart Industry Management Systems. 615-630
Attacks
- Shyam Murthy

, Srinivas Vivek
:
Driver Locations Harvesting Attack on pRide. 633-648 - Shun Li

, Guozhen Liu
, Phuong Pham
:
Rebound Attacks on sfSKINNY Hashing with Automatic Tools. 649-666 - Wei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao:

A Combination Reduction Algorithm and Its Application. 667-683
Cryptographic Algorithms and Protocols
- Zhenzhen Bao

, Jian Guo
, Shun Li
, Phuong Pham
:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. 687-711 - Xiaoling Yu

, Lei Xu, Xin Huang, Chungen Xu:
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security. 712-726 - Anit Kumar Ghosal

, Dipanwita Roychowdhury
:
Strengthening the Security of AES Against Differential Fault Attack. 727-744

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














