Search dblp for Publications

export results for "toc:db/conf/nss/nss2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/nss/AbbasiWBZE17,
  author       = {Ali Abbasi and
                  Jos Wetzels and
                  Wouter Bokslag and
                  Emmanuele Zambon and
                  Sandro Etalle},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {{\textbackslash}mu Shield - Configurable Code-Reuse Attacks Mitigation
                  For Embedded Systems},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {694--709},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_55},
  doi          = {10.1007/978-3-319-64701-2\_55},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/AbbasiWBZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/AhmedS17,
  author       = {Tahmina Ahmed and
                  Ravi S. Sandhu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Safety of {ABAC} {\_}{\textbackslash}alpha Is Decidable},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_19},
  doi          = {10.1007/978-3-319-64701-2\_19},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/AhmedS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Al-JanabiA17,
  author       = {Mohammed Al{-}Janabi and
                  Peter Andras},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Systematic Analysis of Random Forest Based Social Media Spam Classification},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {427--438},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_31},
  doi          = {10.1007/978-3-319-64701-2\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Al-JanabiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BhattPS17,
  author       = {Smriti Bhatt and
                  Farhan Patwa and
                  Ravi S. Sandhu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Access Control Model for {AWS} Internet of Things},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {721--736},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_57},
  doi          = {10.1007/978-3-319-64701-2\_57},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/BhattPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChenFY17,
  author       = {Hanlu Chen and
                  Yulong Fu and
                  Zheng Yan},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Survey on Big Data Analysis Algorithms for Network Security Measurement},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {128--142},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_10},
  doi          = {10.1007/978-3-319-64701-2\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ChenFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChenLH17,
  author       = {Yun Chen and
                  Kun Lv and
                  Changzhen Hu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Optimal Attack Path Generation Based on Supervised Kohonen Neural
                  Network},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {399--412},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_29},
  doi          = {10.1007/978-3-319-64701-2\_29},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ChenLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChenLKC17,
  author       = {Chia{-}Mei Chen and
                  Gu Hsin Lai and
                  Yen{-}Chih Kuo and
                  Tan{-}Ho Chang},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Improving Alert Accuracy for Smart Vehicles},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {623--631},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_49},
  doi          = {10.1007/978-3-319-64701-2\_49},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ChenLKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/DalaiR17,
  author       = {Deepak Kumar Dalai and
                  Dibyendu Roy},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A State Recovery Attack on ACORN-v1 and ACORN-v2},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {332--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_24},
  doi          = {10.1007/978-3-319-64701-2\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/DalaiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/DalaiS17,
  author       = {Deepak Kumar Dalai and
                  Pinaki Sarkar},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Enhancing Resilience of {KPS} Using Bidirectional Hash Chains and
                  Application on Sensornet},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {683--693},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_54},
  doi          = {10.1007/978-3-319-64701-2\_54},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/DalaiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/DongLYWPZ17,
  author       = {Yajie Dong and
                  Zhenyan Liu and
                  Yida Yan and
                  Yong Wang and
                  Tu Peng and
                  Ji Zhang},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Machine Learning for Analyzing Malware},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {386--398},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_28},
  doi          = {10.1007/978-3-319-64701-2\_28},
  timestamp    = {Thu, 19 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/DongLYWPZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Eitschberger0H17,
  author       = {Patrick Eitschberger and
                  J{\"{o}}rg Keller and
                  Simon Holmbacka},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Hardware and Software Support for Transposition of Bit Matrices in
                  High-Speed Encryption},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {160--168},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_12},
  doi          = {10.1007/978-3-319-64701-2\_12},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Eitschberger0H17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Emura17,
  author       = {Keita Emura},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Generic Construction of Secure-Channel Free Searchable Encryption
                  with Multiple Keywords},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_1},
  doi          = {10.1007/978-3-319-64701-2\_1},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Emura17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/FoukiaBS17,
  author       = {Noria Foukia and
                  David Billard and
                  Eduardo Solana},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Privacy Verification Chains for IoT},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {737--752},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_58},
  doi          = {10.1007/978-3-319-64701-2\_58},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/FoukiaBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/FtimaKG17,
  author       = {Fakher Ben Ftima and
                  Kamel Karoui and
                  Henda Ben Gh{\'{e}}zala},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Formal Approach for Network Security Policy Relevancy Checking},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {555--564},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_42},
  doi          = {10.1007/978-3-319-64701-2\_42},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/FtimaKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/GharibG17,
  author       = {Amirhossein Gharib and
                  Ali A. Ghorbani},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {DNA-Droid: {A} Real-Time Android Ransomware Detection Framework},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_14},
  doi          = {10.1007/978-3-319-64701-2\_14},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/GharibG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HaoLRWX17,
  author       = {Jialu Hao and
                  Jian Liu and
                  Hong Rong and
                  Huimei Wang and
                  Ming Xian},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {{OE-CP-ABE:} Over-Encryption Based {CP-ABE} Scheme for Efficient Policy
                  Updating},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {499--509},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_37},
  doi          = {10.1007/978-3-319-64701-2\_37},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/HaoLRWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HeZLDLW17,
  author       = {Fannv He and
                  Yuqing Zhang and
                  Donghang Liu and
                  Ying Dong and
                  Caiyun Liu and
                  Chensi Wu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Mixed Wavelet-Based Neural Network Model for Cyber Security Situation
                  Prediction Using {MODWT} and Hurst Exponent Analysis},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {99--111},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_8},
  doi          = {10.1007/978-3-319-64701-2\_8},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/HeZLDLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HippelainenOL17,
  author       = {Leo Hippelainen and
                  Ian Oliver and
                  Shankar Lal},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Towards Dependably Detecting Geolocation of Cloud Servers},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {643--656},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_51},
  doi          = {10.1007/978-3-319-64701-2\_51},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/HippelainenOL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HoltmannsMO17,
  author       = {Silke Holtmanns and
                  Yoan Miche and
                  Ian Oliver},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Subscriber Profile Extraction and Modification via Diameter Interconnection},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {585--594},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_45},
  doi          = {10.1007/978-3-319-64701-2\_45},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/HoltmannsMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Isotalo17,
  author       = {Lauri Isotalo},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {5G Slicing as a Tool to Test User Equipment Against Advanced Persistent
                  Threats},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {595--603},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_46},
  doi          = {10.1007/978-3-319-64701-2\_46},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Isotalo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/IvannikovaZ017,
  author       = {Elena Ivannikova and
                  Mikhail Zolotukhin and
                  Timo H{\"{a}}m{\"{a}}l{\"{a}}inen},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Probabilistic Transition-Based Approach for Detecting Application-Layer
                  DDoS Attacks in Encrypted Software-Defined Networks},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {531--543},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_40},
  doi          = {10.1007/978-3-319-64701-2\_40},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/IvannikovaZ017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/JiangMWSL17,
  author       = {Lijun Jiang and
                  Weizhi Meng and
                  Yu Wang and
                  Chunhua Su and
                  Jin Li},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones:
                  {A} Pilot Study},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_15},
  doi          = {10.1007/978-3-319-64701-2\_15},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/JiangMWSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Kabashkin17,
  author       = {Igor Kabashkin},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Risk Modelling of Blockchain Ecosystem},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {59--70},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_5},
  doi          = {10.1007/978-3-319-64701-2\_5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Kabashkin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KannistoH17,
  author       = {Joona Kannisto and
                  Jarmo Harju},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {The Time Will Tell on You: Exploring Information Leaks in {SSH} Public
                  Key Authentication},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {301--314},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_22},
  doi          = {10.1007/978-3-319-64701-2\_22},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KannistoH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Kar17,
  author       = {Jayaprakash Kar},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature
                  Scheme},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_21},
  doi          = {10.1007/978-3-319-64701-2\_21},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Kar17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KhanN17,
  author       = {Mohsin Khan and
                  Valtteri Niemi},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Concealing {IMSI} in 5G Network Using Identity Based Encryption},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {544--554},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_41},
  doi          = {10.1007/978-3-319-64701-2\_41},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KhanN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiYGLLC17,
  author       = {Jing Li and
                  Lihua Yin and
                  Yunchuan Guo and
                  Chao Li and
                  Fenghua Li and
                  Lihua Chen},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Novel Threat-Driven Data Collection Method for Resource-Constrained
                  Networks},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {486--496},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_36},
  doi          = {10.1007/978-3-319-64701-2\_36},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiYGLLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Liang0SWFH17,
  author       = {Lulu Liang and
                  Kai Zheng and
                  Qiankun Sheng and
                  Wei Wang and
                  Rong Fu and
                  Xin Huang},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Denial of Service Attack Method for IoT System in Photovoltaic Energy
                  System},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {613--622},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_48},
  doi          = {10.1007/978-3-319-64701-2\_48},
  timestamp    = {Mon, 09 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Liang0SWFH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiuDLDHWZM17,
  author       = {Donghang Liu and
                  Lihua Dong and
                  Shaoqing Lv and
                  Ying Dong and
                  Fannv He and
                  Chensi Wu and
                  Yuqing Zhang and
                  Hua Ma},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Novel Approach to Network Security Situation Assessment Based on
                  Attack Confidence},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {450--463},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_33},
  doi          = {10.1007/978-3-319-64701-2\_33},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiuDLDHWZM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MaCMHW17,
  author       = {Rui Ma and
                  Siyu Chen and
                  Ke Ma and
                  Changzhen Hu and
                  Xiajing Wang},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Defenses Against Wormhole Attacks in Wireless Sensor Networks},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {413--426},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_30},
  doi          = {10.1007/978-3-319-64701-2\_30},
  timestamp    = {Tue, 07 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MaCMHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MaZHSZ17,
  author       = {Rui Ma and
                  Tianbao Zhu and
                  Changzhen Hu and
                  Chun Shan and
                  Xiaolin Zhao},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {SulleyEX: {A} Fuzzer for Stateful Network Protocol},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {359--372},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_26},
  doi          = {10.1007/978-3-319-64701-2\_26},
  timestamp    = {Tue, 07 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MaZHSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MeciasJL17,
  author       = {Rendon S{\'{a}}nchez Angel Mec{\'{\i}}as and
                  Octavio Jos{\'{e}} Salcedo Parra and
                  Correa S{\'{a}}nchez Lewys},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Platform for Detection of Holes in the Bogot{\'{a}} {D.C.} Road
                  Network and Exposure of the Information in a Web Environment},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {753--760},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_59},
  doi          = {10.1007/978-3-319-64701-2\_59},
  timestamp    = {Mon, 20 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/MeciasJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MeskanenNN17,
  author       = {Tommi Meskanen and
                  Masoud Naderpour and
                  Valtteri Niemi},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Mind Your Right to Know: On De-anonymization Auditability in {V2X}
                  Communications},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {604--610},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_47},
  doi          = {10.1007/978-3-319-64701-2\_47},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MeskanenNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MihaiLP17,
  author       = {Irina Mihai and
                  Catalin Adrian Leordeanu and
                  Alecsandru Patrascu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Covert Channels Implementation and Detection in Virtual Environments},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {575--584},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_44},
  doi          = {10.1007/978-3-319-64701-2\_44},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MihaiLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/NasserML17,
  author       = {Ahmad M. K. Nasser and
                  Di Ma and
                  Sam Lauzon},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Exploiting {AUTOSAR} Safety Mechanisms to Launch Security Attacks},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_6},
  doi          = {10.1007/978-3-319-64701-2\_6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/NasserML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/NguyenTMN17,
  author       = {Dang Nguyen and
                  Dat Tran and
                  Wanli Ma and
                  Khoa Nguyen},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {EEG-Based Random Number Generators},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {248--256},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_18},
  doi          = {10.1007/978-3-319-64701-2\_18},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/NguyenTMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/NishikawaAI17,
  author       = {Naoki Nishikawa and
                  Hideharu Amano and
                  Keisuke Iwai},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Implementation of Bitsliced {AES} Encryption on CUDA-Enabled {GPU}},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {273--287},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_20},
  doi          = {10.1007/978-3-319-64701-2\_20},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/NishikawaAI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/NurmiN17,
  author       = {Juha Nurmi and
                  Mikko S. Niemel{\"{a}}},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Tor De-anonymisation Techniques},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {657--671},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_52},
  doi          = {10.1007/978-3-319-64701-2\_52},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/NurmiN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/OliverHMLHKR17,
  author       = {Ian Oliver and
                  Silke Holtmanns and
                  Yoan Miche and
                  Shankar Lal and
                  Leo Hippel{\"{a}}inen and
                  Aapo Kalliola and
                  Sowmya Ravidas},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Experiences in Trusted Cloud Computing},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {19--30},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_2},
  doi          = {10.1007/978-3-319-64701-2\_2},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/OliverHMLHKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Phong17,
  author       = {Le Trieu Phong},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed
                  Trainers},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {510--518},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_38},
  doi          = {10.1007/978-3-319-64701-2\_38},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Phong17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/PieberUSM17,
  author       = {Thomas W. Pieber and
                  Thomas Ulz and
                  Christian Steger and
                  Rainer Matischek},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Hardware Secured, Password-based Authentication for Smart Sensors
                  for the Industrial Internet of Things},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {632--642},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_50},
  doi          = {10.1007/978-3-319-64701-2\_50},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/PieberUSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RamezanianMNN17,
  author       = {Sara Ramezanian and
                  Tommi Meskanen and
                  Masoud Naderpour and
                  Valtteri Niemi},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Private Membership Test Protocol with Low Communication Complexity},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_3},
  doi          = {10.1007/978-3-319-64701-2\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/RamezanianMNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ReshetovaBA17,
  author       = {Elena Reshetova and
                  Filippo Bonazzi and
                  N. Asokan},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Randomization Can't Stop {BPF} {JIT} Spray},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_17},
  doi          = {10.1007/978-3-319-64701-2\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ReshetovaBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Saia17,
  author       = {Roberto Saia},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Discrete Wavelet Transform Approach to Fraud Detection},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {464--474},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_34},
  doi          = {10.1007/978-3-319-64701-2\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/Saia17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Sarkar17,
  author       = {Pinaki Sarkar},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement
                  Scheme {(KAS)}},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_23},
  doi          = {10.1007/978-3-319-64701-2\_23},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Sarkar17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ShafieianSZ17,
  author       = {Saeed Shafieian and
                  Daniel Smith and
                  Mohammad Zulkernine},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Detecting {DNS} Tunneling Using Ensemble Learning},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_9},
  doi          = {10.1007/978-3-319-64701-2\_9},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ShafieianSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ShanSXHZ17,
  author       = {Chun Shan and
                  Shiyou Sun and
                  Jingfeng Xue and
                  Changzhen Hu and
                  Hongjin Zhu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Detecting Method of Array Bounds Defects Based on Symbolic Execution},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {373--385},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_27},
  doi          = {10.1007/978-3-319-64701-2\_27},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ShanSXHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TanTZW17,
  author       = {Huiting Tan and
                  Chaojing Tang and
                  Chen Zhang and
                  Shaolei Wang},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Area-Dividing Route Mutation in Moving Target Defense Based on {SDN}},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {565--574},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_43},
  doi          = {10.1007/978-3-319-64701-2\_43},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TanTZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TianQZYHX17,
  author       = {Donghai Tian and
                  Dingjun Qi and
                  Li Zhan and
                  Yuhang Yin and
                  Changzhen Hu and
                  Jingfeng Xue},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Practical Method to Confine Sensitive {API} Invocations on Commodity
                  Hardware},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_11},
  doi          = {10.1007/978-3-319-64701-2\_11},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TianQZYHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TripathyK17,
  author       = {Somanath Tripathy and
                  Praveen Kumar},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {CookiesWall: Preventing Session Hijacking Attacks Using Client Side
                  Proxy},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_7},
  doi          = {10.1007/978-3-319-64701-2\_7},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TripathyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/VajarantaKH17,
  author       = {Markku Vajaranta and
                  Joona Kannisto and
                  Jarmo Harju},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {IPsec and {IKE} as Functions in {SDN} Controlled Network},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {521--530},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_39},
  doi          = {10.1007/978-3-319-64701-2\_39},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/VajarantaKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangHAP17,
  author       = {Lihua Wang and
                  Takuya Hayashi and
                  Yoshinori Aono and
                  Le Trieu Phong},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Generic yet Efficient Method for Secure Inner Product},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_16},
  doi          = {10.1007/978-3-319-64701-2\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WangHAP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WuZD17,
  author       = {Chensi Wu and
                  Yuqing Zhang and
                  Ying Dong},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Application Research on Network Attacks and Defenses with Zachman
                  Framework},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {439--449},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_32},
  doi          = {10.1007/978-3-319-64701-2\_32},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WuZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/XueJHL17,
  author       = {Nian Xue and
                  Chenglong Jiang and
                  Xin Huang and
                  Dawei Liu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Role-Based Access Control System for Intelligent Buildings},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {710--720},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_56},
  doi          = {10.1007/978-3-319-64701-2\_56},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/XueJHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangLH17,
  author       = {Hao Zhang and
                  Kun Lv and
                  Changzhen Hu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {An Automatic Vulnerabilities Classification Method Based on Their
                  Relevance},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {475--485},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_35},
  doi          = {10.1007/978-3-319-64701-2\_35},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangW17,
  author       = {Leyou Zhang and
                  Qing Wu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Adaptively Secure Hierarchical Identity-Based Encryption over Lattice},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {46--58},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_4},
  doi          = {10.1007/978-3-319-64701-2\_4},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangYLXW17,
  author       = {Jiayuan Zhang and
                  Yao Yao and
                  Xiaoqi Li and
                  Jian Xie and
                  Gaofei Wu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {An Android Vulnerability Detection System},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_13},
  doi          = {10.1007/978-3-319-64701-2\_13},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangYLXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhengLH17,
  author       = {Yukun Zheng and
                  Kun Lv and
                  Changzhen Hu},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {A Quantitative Method for Evaluating Network Security Based on Attack
                  Graph},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {349--358},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_25},
  doi          = {10.1007/978-3-319-64701-2\_25},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhengLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Zima17,
  author       = {Michal Zima},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Coincer: Decentralised Trustless Platform for Exchanging Decentralised
                  Cryptocurrencies},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {672--682},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_53},
  doi          = {10.1007/978-3-319-64701-2\_53},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Zima17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2017,
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2},
  doi          = {10.1007/978-3-319-64701-2},
  isbn         = {978-3-319-64700-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics