Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/nss/nss2017.bht:"
@inproceedings{DBLP:conf/nss/AbbasiWBZE17, author = {Ali Abbasi and Jos Wetzels and Wouter Bokslag and Emmanuele Zambon and Sandro Etalle}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {{\textbackslash}mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {694--709}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_55}, doi = {10.1007/978-3-319-64701-2\_55}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/AbbasiWBZE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/AhmedS17, author = {Tahmina Ahmed and Ravi S. Sandhu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Safety of {ABAC} {\_}{\textbackslash}alpha Is Decidable}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {257--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_19}, doi = {10.1007/978-3-319-64701-2\_19}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/AhmedS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Al-JanabiA17, author = {Mohammed Al{-}Janabi and Peter Andras}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Systematic Analysis of Random Forest Based Social Media Spam Classification}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {427--438}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_31}, doi = {10.1007/978-3-319-64701-2\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Al-JanabiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BhattPS17, author = {Smriti Bhatt and Farhan Patwa and Ravi S. Sandhu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Access Control Model for {AWS} Internet of Things}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {721--736}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_57}, doi = {10.1007/978-3-319-64701-2\_57}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/BhattPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ChenFY17, author = {Hanlu Chen and Yulong Fu and Zheng Yan}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Survey on Big Data Analysis Algorithms for Network Security Measurement}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {128--142}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_10}, doi = {10.1007/978-3-319-64701-2\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ChenFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ChenLH17, author = {Yun Chen and Kun Lv and Changzhen Hu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Optimal Attack Path Generation Based on Supervised Kohonen Neural Network}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {399--412}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_29}, doi = {10.1007/978-3-319-64701-2\_29}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ChenLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ChenLKC17, author = {Chia{-}Mei Chen and Gu Hsin Lai and Yen{-}Chih Kuo and Tan{-}Ho Chang}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Improving Alert Accuracy for Smart Vehicles}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {623--631}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_49}, doi = {10.1007/978-3-319-64701-2\_49}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ChenLKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/DalaiR17, author = {Deepak Kumar Dalai and Dibyendu Roy}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A State Recovery Attack on ACORN-v1 and ACORN-v2}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {332--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_24}, doi = {10.1007/978-3-319-64701-2\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/DalaiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/DalaiS17, author = {Deepak Kumar Dalai and Pinaki Sarkar}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Enhancing Resilience of {KPS} Using Bidirectional Hash Chains and Application on Sensornet}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {683--693}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_54}, doi = {10.1007/978-3-319-64701-2\_54}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/DalaiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/DongLYWPZ17, author = {Yajie Dong and Zhenyan Liu and Yida Yan and Yong Wang and Tu Peng and Ji Zhang}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Machine Learning for Analyzing Malware}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {386--398}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_28}, doi = {10.1007/978-3-319-64701-2\_28}, timestamp = {Thu, 19 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/DongLYWPZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Eitschberger0H17, author = {Patrick Eitschberger and J{\"{o}}rg Keller and Simon Holmbacka}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {160--168}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_12}, doi = {10.1007/978-3-319-64701-2\_12}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Eitschberger0H17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Emura17, author = {Keita Emura}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_1}, doi = {10.1007/978-3-319-64701-2\_1}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Emura17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/FoukiaBS17, author = {Noria Foukia and David Billard and Eduardo Solana}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Privacy Verification Chains for IoT}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {737--752}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_58}, doi = {10.1007/978-3-319-64701-2\_58}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/FoukiaBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/FtimaKG17, author = {Fakher Ben Ftima and Kamel Karoui and Henda Ben Gh{\'{e}}zala}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Formal Approach for Network Security Policy Relevancy Checking}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {555--564}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_42}, doi = {10.1007/978-3-319-64701-2\_42}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/FtimaKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/GharibG17, author = {Amirhossein Gharib and Ali A. Ghorbani}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {DNA-Droid: {A} Real-Time Android Ransomware Detection Framework}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {184--198}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_14}, doi = {10.1007/978-3-319-64701-2\_14}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/GharibG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HaoLRWX17, author = {Jialu Hao and Jian Liu and Hong Rong and Huimei Wang and Ming Xian}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {{OE-CP-ABE:} Over-Encryption Based {CP-ABE} Scheme for Efficient Policy Updating}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {499--509}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_37}, doi = {10.1007/978-3-319-64701-2\_37}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/HaoLRWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HeZLDLW17, author = {Fannv He and Yuqing Zhang and Donghang Liu and Ying Dong and Caiyun Liu and Chensi Wu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using {MODWT} and Hurst Exponent Analysis}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {99--111}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_8}, doi = {10.1007/978-3-319-64701-2\_8}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/HeZLDLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HippelainenOL17, author = {Leo Hippelainen and Ian Oliver and Shankar Lal}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Towards Dependably Detecting Geolocation of Cloud Servers}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {643--656}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_51}, doi = {10.1007/978-3-319-64701-2\_51}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/HippelainenOL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HoltmannsMO17, author = {Silke Holtmanns and Yoan Miche and Ian Oliver}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Subscriber Profile Extraction and Modification via Diameter Interconnection}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {585--594}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_45}, doi = {10.1007/978-3-319-64701-2\_45}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/HoltmannsMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Isotalo17, author = {Lauri Isotalo}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {595--603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_46}, doi = {10.1007/978-3-319-64701-2\_46}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Isotalo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/IvannikovaZ017, author = {Elena Ivannikova and Mikhail Zolotukhin and Timo H{\"{a}}m{\"{a}}l{\"{a}}inen}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {531--543}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_40}, doi = {10.1007/978-3-319-64701-2\_40}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/IvannikovaZ017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/JiangMWSL17, author = {Lijun Jiang and Weizhi Meng and Yu Wang and Chunhua Su and Jin Li}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: {A} Pilot Study}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {199--213}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_15}, doi = {10.1007/978-3-319-64701-2\_15}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/JiangMWSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Kabashkin17, author = {Igor Kabashkin}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Risk Modelling of Blockchain Ecosystem}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {59--70}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_5}, doi = {10.1007/978-3-319-64701-2\_5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Kabashkin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KannistoH17, author = {Joona Kannisto and Jarmo Harju}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {The Time Will Tell on You: Exploring Information Leaks in {SSH} Public Key Authentication}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {301--314}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_22}, doi = {10.1007/978-3-319-64701-2\_22}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KannistoH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Kar17, author = {Jayaprakash Kar}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {291--300}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_21}, doi = {10.1007/978-3-319-64701-2\_21}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Kar17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KhanN17, author = {Mohsin Khan and Valtteri Niemi}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Concealing {IMSI} in 5G Network Using Identity Based Encryption}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {544--554}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_41}, doi = {10.1007/978-3-319-64701-2\_41}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KhanN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiYGLLC17, author = {Jing Li and Lihua Yin and Yunchuan Guo and Chao Li and Fenghua Li and Lihua Chen}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {486--496}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_36}, doi = {10.1007/978-3-319-64701-2\_36}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiYGLLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Liang0SWFH17, author = {Lulu Liang and Kai Zheng and Qiankun Sheng and Wei Wang and Rong Fu and Xin Huang}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Denial of Service Attack Method for IoT System in Photovoltaic Energy System}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {613--622}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_48}, doi = {10.1007/978-3-319-64701-2\_48}, timestamp = {Mon, 09 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Liang0SWFH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiuDLDHWZM17, author = {Donghang Liu and Lihua Dong and Shaoqing Lv and Ying Dong and Fannv He and Chensi Wu and Yuqing Zhang and Hua Ma}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Novel Approach to Network Security Situation Assessment Based on Attack Confidence}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {450--463}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_33}, doi = {10.1007/978-3-319-64701-2\_33}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiuDLDHWZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaCMHW17, author = {Rui Ma and Siyu Chen and Ke Ma and Changzhen Hu and Xiajing Wang}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Defenses Against Wormhole Attacks in Wireless Sensor Networks}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {413--426}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_30}, doi = {10.1007/978-3-319-64701-2\_30}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MaCMHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaZHSZ17, author = {Rui Ma and Tianbao Zhu and Changzhen Hu and Chun Shan and Xiaolin Zhao}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {SulleyEX: {A} Fuzzer for Stateful Network Protocol}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {359--372}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_26}, doi = {10.1007/978-3-319-64701-2\_26}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MaZHSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MeciasJL17, author = {Rendon S{\'{a}}nchez Angel Mec{\'{\i}}as and Octavio Jos{\'{e}} Salcedo Parra and Correa S{\'{a}}nchez Lewys}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Platform for Detection of Holes in the Bogot{\'{a}} {D.C.} Road Network and Exposure of the Information in a Web Environment}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {753--760}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_59}, doi = {10.1007/978-3-319-64701-2\_59}, timestamp = {Mon, 20 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/MeciasJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MeskanenNN17, author = {Tommi Meskanen and Masoud Naderpour and Valtteri Niemi}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Mind Your Right to Know: On De-anonymization Auditability in {V2X} Communications}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {604--610}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_47}, doi = {10.1007/978-3-319-64701-2\_47}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MeskanenNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MihaiLP17, author = {Irina Mihai and Catalin Adrian Leordeanu and Alecsandru Patrascu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Covert Channels Implementation and Detection in Virtual Environments}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {575--584}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_44}, doi = {10.1007/978-3-319-64701-2\_44}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MihaiLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/NasserML17, author = {Ahmad M. K. Nasser and Di Ma and Sam Lauzon}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Exploiting {AUTOSAR} Safety Mechanisms to Launch Security Attacks}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {73--86}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_6}, doi = {10.1007/978-3-319-64701-2\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/NasserML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/NguyenTMN17, author = {Dang Nguyen and Dat Tran and Wanli Ma and Khoa Nguyen}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {EEG-Based Random Number Generators}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {248--256}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_18}, doi = {10.1007/978-3-319-64701-2\_18}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/NguyenTMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/NishikawaAI17, author = {Naoki Nishikawa and Hideharu Amano and Keisuke Iwai}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Implementation of Bitsliced {AES} Encryption on CUDA-Enabled {GPU}}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {273--287}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_20}, doi = {10.1007/978-3-319-64701-2\_20}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/NishikawaAI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/NurmiN17, author = {Juha Nurmi and Mikko S. Niemel{\"{a}}}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Tor De-anonymisation Techniques}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {657--671}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_52}, doi = {10.1007/978-3-319-64701-2\_52}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/NurmiN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/OliverHMLHKR17, author = {Ian Oliver and Silke Holtmanns and Yoan Miche and Shankar Lal and Leo Hippel{\"{a}}inen and Aapo Kalliola and Sowmya Ravidas}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Experiences in Trusted Cloud Computing}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {19--30}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_2}, doi = {10.1007/978-3-319-64701-2\_2}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/OliverHMLHKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Phong17, author = {Le Trieu Phong}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {510--518}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_38}, doi = {10.1007/978-3-319-64701-2\_38}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Phong17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/PieberUSM17, author = {Thomas W. Pieber and Thomas Ulz and Christian Steger and Rainer Matischek}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {632--642}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_50}, doi = {10.1007/978-3-319-64701-2\_50}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/PieberUSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RamezanianMNN17, author = {Sara Ramezanian and Tommi Meskanen and Masoud Naderpour and Valtteri Niemi}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Private Membership Test Protocol with Low Communication Complexity}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {31--45}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_3}, doi = {10.1007/978-3-319-64701-2\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/RamezanianMNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ReshetovaBA17, author = {Elena Reshetova and Filippo Bonazzi and N. Asokan}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Randomization Can't Stop {BPF} {JIT} Spray}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {233--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_17}, doi = {10.1007/978-3-319-64701-2\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ReshetovaBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Saia17, author = {Roberto Saia}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Discrete Wavelet Transform Approach to Fraud Detection}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {464--474}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_34}, doi = {10.1007/978-3-319-64701-2\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/Saia17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Sarkar17, author = {Pinaki Sarkar}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme {(KAS)}}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {315--331}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_23}, doi = {10.1007/978-3-319-64701-2\_23}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Sarkar17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShafieianSZ17, author = {Saeed Shafieian and Daniel Smith and Mohammad Zulkernine}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Detecting {DNS} Tunneling Using Ensemble Learning}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {112--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_9}, doi = {10.1007/978-3-319-64701-2\_9}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShafieianSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShanSXHZ17, author = {Chun Shan and Shiyou Sun and Jingfeng Xue and Changzhen Hu and Hongjin Zhu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Detecting Method of Array Bounds Defects Based on Symbolic Execution}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {373--385}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_27}, doi = {10.1007/978-3-319-64701-2\_27}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShanSXHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TanTZW17, author = {Huiting Tan and Chaojing Tang and Chen Zhang and Shaolei Wang}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Area-Dividing Route Mutation in Moving Target Defense Based on {SDN}}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {565--574}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_43}, doi = {10.1007/978-3-319-64701-2\_43}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/TanTZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TianQZYHX17, author = {Donghai Tian and Dingjun Qi and Li Zhan and Yuhang Yin and Changzhen Hu and Jingfeng Xue}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Practical Method to Confine Sensitive {API} Invocations on Commodity Hardware}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {145--159}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_11}, doi = {10.1007/978-3-319-64701-2\_11}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/TianQZYHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TripathyK17, author = {Somanath Tripathy and Praveen Kumar}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {87--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_7}, doi = {10.1007/978-3-319-64701-2\_7}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/TripathyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/VajarantaKH17, author = {Markku Vajaranta and Joona Kannisto and Jarmo Harju}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {IPsec and {IKE} as Functions in {SDN} Controlled Network}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {521--530}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_39}, doi = {10.1007/978-3-319-64701-2\_39}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/VajarantaKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangHAP17, author = {Lihua Wang and Takuya Hayashi and Yoshinori Aono and Le Trieu Phong}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Generic yet Efficient Method for Secure Inner Product}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {217--232}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_16}, doi = {10.1007/978-3-319-64701-2\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WangHAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WuZD17, author = {Chensi Wu and Yuqing Zhang and Ying Dong}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Application Research on Network Attacks and Defenses with Zachman Framework}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {439--449}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_32}, doi = {10.1007/978-3-319-64701-2\_32}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WuZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XueJHL17, author = {Nian Xue and Chenglong Jiang and Xin Huang and Dawei Liu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Role-Based Access Control System for Intelligent Buildings}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {710--720}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_56}, doi = {10.1007/978-3-319-64701-2\_56}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/XueJHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangLH17, author = {Hao Zhang and Kun Lv and Changzhen Hu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {An Automatic Vulnerabilities Classification Method Based on Their Relevance}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {475--485}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_35}, doi = {10.1007/978-3-319-64701-2\_35}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangW17, author = {Leyou Zhang and Qing Wu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Adaptively Secure Hierarchical Identity-Based Encryption over Lattice}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {46--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_4}, doi = {10.1007/978-3-319-64701-2\_4}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ZhangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangYLXW17, author = {Jiayuan Zhang and Yao Yao and Xiaoqi Li and Jian Xie and Gaofei Wu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {An Android Vulnerability Detection System}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {169--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_13}, doi = {10.1007/978-3-319-64701-2\_13}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ZhangYLXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhengLH17, author = {Yukun Zheng and Kun Lv and Changzhen Hu}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Quantitative Method for Evaluating Network Security Based on Attack Graph}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {349--358}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_25}, doi = {10.1007/978-3-319-64701-2\_25}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhengLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Zima17, author = {Michal Zima}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {672--682}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_53}, doi = {10.1007/978-3-319-64701-2\_53}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Zima17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2017, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2}, doi = {10.1007/978-3-319-64701-2}, isbn = {978-3-319-64700-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.