default search action
17th NSS 2023: Canterbury, UK
- Shujun Li, Mark Manulis, Atsuko Miyaji:
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings. Lecture Notes in Computer Science 13983, Springer 2023, ISBN 978-3-031-39827-8
Attacks and Malware
- Rui Li, Olga Gadyatskaya:
Evaluating Rule-Based Global XAI Malware Detection Methods. 3-22 - Andreas Paul, Franka Schuster, Hartmut König:
Whitelisting for Characterizing and Monitoring Process Control Communication. 23-45 - Satoki Kanno, Mamoru Mimura:
Detection of Malware Using Self-Attention Mechanism and Strings. 46-60 - Hiroki Kuzuno, Toshihiro Yamauchi:
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack. 61-76 - Amirah Almutairi, BooJoong Kang, Nawfal F. Fadhel:
The Effectiveness of Transformer-Based Models for BEC Attack Detection. 77-90
Blockchain
- Aristodemos Paphitis, Nicolas Kourtellis, Michael Sirivianos:
Resilience of Blockchain Overlay Networks. 93-113 - Xiangyu Su, Mario Larangeira, Keisuke Tanaka:
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning. 114-136 - Mayank Raikwar, Shuang Wu, Kristian Gjøsteen:
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. 137-152
Cryptography and Privacy
- Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. 155-176 - Andres Hernandez-Matamoros, Hiroaki Kikuchi:
New LDP Approach Using VAE. 177-191
Machine Learning
- Songwei Luo, Shaojing Fu, Yuchuan Luo, Lin Liu, Yanxiang Deng, Shixiong Wang:
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data. 195-216 - Jia Wang, Shiqing He, Qiuzhen Lin:
RRML: Privacy Preserving Machine Learning Based on Random Response Technology. 217-234 - Zhuotao Lian, Chen Zhang, Kaixi Nan, Chunhua Su:
SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning. 235-248 - Anna Monreale, Francesca Naretto, Simone Rizzo:
Agnostic Label-Only Membership Inference Attack. 249-264 - Ali Burak Ünal, Nico Pfeifer, Mete Akgün:
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves. 265-280
Security Through Hardware
- Aurélien Greuet, Simon Montoya, Clémence Vermeersch:
Modular Polynomial Multiplication Using RSA/ECC Coprocessor. 283-304 - Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen:
T3E: A Practical Solution to Trusted Time in Secure Enclaves. 305-326 - Yunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou:
Decentralized SGX-Based Cloud Key Management. 327-341
Security in the Wild
- Samuel Herodotou, Feng Hao:
Spying on the Spy: Security Analysis of Hidden Cameras. 345-362 - Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao:
Security Analysis of Mobile Point-of-Sale Terminals. 363-384 - David Arroyo, Sara Degli-Esposti, Alberto Gómez-Espés, Santiago Palmero Muñoz, Luis Pérez-Miguel:
On the Design of a Misinformation Widget (MsW) Against Cloaked Science. 385-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.