


default search action
17th NSS 2023: Canterbury, UK
- Shujun Li
, Mark Manulis
, Atsuko Miyaji:
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 13983, Springer 2023, ISBN 978-3-031-39827-8
Attacks and Malware
- Rui Li
, Olga Gadyatskaya
:
Evaluating Rule-Based Global XAI Malware Detection Methods. 3-22 - Andreas Paul, Franka Schuster, Hartmut König:
Whitelisting for Characterizing and Monitoring Process Control Communication. 23-45 - Satoki Kanno, Mamoru Mimura
:
Detection of Malware Using Self-Attention Mechanism and Strings. 46-60 - Hiroki Kuzuno
, Toshihiro Yamauchi
:
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack. 61-76 - Amirah Almutairi
, BooJoong Kang
, Nawfal F. Fadhel
:
The Effectiveness of Transformer-Based Models for BEC Attack Detection. 77-90
Blockchain
- Aristodemos Paphitis, Nicolas Kourtellis, Michael Sirivianos:
Resilience of Blockchain Overlay Networks. 93-113 - Xiangyu Su
, Mario Larangeira
, Keisuke Tanaka
:
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning. 114-136 - Mayank Raikwar, Shuang Wu, Kristian Gjøsteen:
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. 137-152
Cryptography and Privacy
- Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. 155-176 - Andres Hernandez-Matamoros
, Hiroaki Kikuchi
:
New LDP Approach Using VAE. 177-191
Machine Learning
- Songwei Luo
, Shaojing Fu
, Yuchuan Luo
, Lin Liu
, Yanxiang Deng
, Shixiong Wang:
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data. 195-216 - Jia Wang
, Shiqing He, Qiuzhen Lin
:
RRML: Privacy Preserving Machine Learning Based on Random Response Technology. 217-234 - Zhuotao Lian, Chen Zhang
, Kaixi Nan, Chunhua Su:
SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning. 235-248 - Anna Monreale
, Francesca Naretto
, Simone Rizzo
:
Agnostic Label-Only Membership Inference Attack. 249-264 - Ali Burak Ünal
, Nico Pfeifer
, Mete Akgün
:
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves. 265-280
Security Through Hardware
- Aurélien Greuet
, Simon Montoya
, Clémence Vermeersch:
Modular Polynomial Multiplication Using RSA/ECC Coprocessor. 283-304 - Gilang Mentari Hamidy
, Pieter Philippaerts
, Wouter Joosen
:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. 305-326 - Yunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou:
Decentralized SGX-Based Cloud Key Management. 327-341
Security in the Wild
- Samuel Herodotou
, Feng Hao
:
Spying on the Spy: Security Analysis of Hidden Cameras. 345-362 - Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao:
Security Analysis of Mobile Point-of-Sale Terminals. 363-384 - David Arroyo
, Sara Degli-Esposti
, Alberto Gómez-Espés, Santiago Palmero Muñoz, Luis Pérez-Miguel
:
On the Design of a Misinformation Widget (MsW) Against Cloaked Science. 385-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.