


default search action
18th NSS 2024: Abu Dhabi, United Arab Emirates
- Houbing Herbert Song

, Roberto Di Pietro
, Saed Alrabaee
, Mohammad Tubishat
, Mousa Al-Kfairy
, Omar Alfandi
:
Network and System Security - 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings. Lecture Notes in Computer Science 15564, Springer 2025, ISBN 978-981-96-3530-6
Authentication and Security
- Yoshiro Matsuoka, Sohto Chiku

, Keisuke Hara
, Junji Shikata
:
How to Accomplish Key and Communication Compression Over Authentication Channels - Proxy Re-authentication and Its Instantiations. 3-20 - Ryan Williams, Anthony Gavazzi, Engin Kirda:

Enhancing Network Security Through Vulnerability Monitoring. 21-38 - Gerald Palfinger

:
AndroPROTECT: Hardening the Android API Against Fingerprinting. 39-59
Privacy and Encryption
- David Monschein

, Oliver P. Waldhorst
:
Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices. 63-81 - Ali Reza Ghavamipour

, Benjamin Zi Hao Zhao
, Fatih Turkmen
:
PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning. 82-106 - Edona Fasllija

, Jakob Heher, Stefan More
:
Credential Issuance Transparency: A Privacy-Preserving Audit Log of Credential Issuance. 107-126 - Shota Tokuda

, Shohei Kakei
, Yoshiaki Shiraishi
, Shoichi Saito
:
Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology. 127-144
Malware Detection and Prevention
- Minh Tien Truong

, Nils Gruschka
, Luigi Lo Iacono
:
You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains. 147-166 - Attila Mester

, Zalán Bodó
, P. Vinod
, Mauro Conti
:
Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization. 167-186 - Safayat Bin Hakim, Muhammad Adil, Kamal Acharya, Houbing Herbert Song:

Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach. 187-209
System Security and Prevention
- Hiroki Kuzuno

, Toshihiro Yamauchi
:
RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks. 213-231 - Muhammad Salman, I. Wayan Budi Santana

, Muhammad Ikram, Mohamed Ali Kâafar:
Auditing and Attributing Behaviours of Suspicious Android Health Applications. 232-253 - Yazan Alahmed

, Reema Abadla, Mahmoud Khasawneh
:
Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks. 254-274
Network and Infrastructure Security
- Zeya Umayya

, Arpit Nandi, Amartyo Roy, Sambuddho Chakravarty:
Every Sherlock Needs a Watson: Practical Semi-realtime Attack Elaboration System. 277-300 - Maurantonio Caprolu

, Simone Raponi
, Roberto Di Pietro
:
Sharing Is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN). 301-318 - S. Jithin, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity, Sambuddho Chakravarty:

VoIP Vanguard: A Practical Front Line Defense Against VoIP Identification Attacks in Tor. 319-346
Blockchain and Smart Contracts
- Wan Kai Wong, Naipeng Dong, Cong Minh Dinh:

PQS-BC: Comparative Analysis of NIST Post-quantum Signatures for Blockchain. 349-369 - Partha Sarathi Chakraborty

, Somanath Tripathy
:
SPVPC: Smart Contract Based Publicly Verifiable Polynomial Computations. 370-386 - Gayle Frisbie, Omar A. Darwish

, Anas M. R. Alsobeh
, Abdallah Al-shorman:
Identifying the Origins of Business Data Breaches Through CTC Detection. 387-406
Data Security
- Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:

VulMatch: Binary-Level Vulnerability Detection Through Signature. 409-427 - Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, Jie Tang:

Revisiting Binary Code Authorship Analysis. 428-449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














