default search action
16th NSS 2022: Denarau Island, Fiji
- Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar:
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13787, Springer 2022, ISBN 978-3-031-23019-6
AI for Network Security
- Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu:
Vulnerability Detection Using Deep Learning Based Function Classification. 3-22 - Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone:
RAIDER: Reinforcement-Aided Spear Phishing Detector. 23-50 - Yunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan:
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning. 51-65 - Stuart W. Hall, Amin Sakzad, Sepehr Minagar:
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics. 66-85 - Wei Hong, Jiao Yin, Mingshan You, Hua Wang, Jinli Cao, Jianxin Li, Ming Liu:
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. 86-102
Network Security
- Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan:
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. 105-119 - Kurt Friday, Elias Bou-Harb, Jorge Crichigno:
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches. 120-139 - Eric Ficke, Raymond M. Bateman, Shouhuai Xu:
Reducing Intrusion Alert Trees to Aid Visualization. 140-154 - Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens:
Attacker Attribution via Characteristics Inference Using Honeypot Data. 155-169 - Xinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo:
Detecting Contradictions from CoAP RFC Based on Knowledge Graph. 170-189
Mobile Security
- Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar:
A First Look at Android Apps' Third-Party Resources Loading. 193-213 - Shuang Zhao, Jincheng Zhong, Shuhui Chen, Jianbing Liang:
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset. 214-232 - Bo Yang, Yanchao Zhang, Dong Tong:
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices. 233-248 - Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi:
A Beyond-5G Authentication and Key Agreement Protocol. 249-264
IoT Security
- Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang:
A Survey on IoT Vulnerability Discovery. 267-282 - Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam:
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. 283-304 - Tianqi Zhou, Wenying Zheng, Haowen Tan:
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. 305-318 - Bhagyashri Tushir, Yuhong Liu, Behnam Dezfouli:
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection. 319-334 - Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. 335-353
Privacy-Preserving Machine Learning Protocols and Systems
- Han Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He:
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning. 357-373 - Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang:
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication. 374-386 - Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang, Xu Yang:
An Efficient Clustering-Based Privacy-Preserving Recommender System. 387-405 - Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. 406-425
Privacy-Preserving Networked Systems and Protocols
- Hongcheng Xie, Zizhuo Chen, Yu Guo, Qin Liu, Xiaohua Jia:
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server. 429-442 - Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui, Fei Zhu:
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare. 443-458 - Bo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu, Bin Guo:
Enabling Secure Deduplication in Encrypted Decentralized Storage. 459-475 - Mengwei Yang, Chungen Xu, Pan Zhang:
Geometric Range Searchable Encryption with Forward and Backward Security. 476-495
Blockchain Security
- Yining Xie, Xin Kang, Tieyan Li, Cheng-Kang Chu, Haiguang Wang:
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach. 499-513 - Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. 514-523 - Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu, Shengwu Xiong:
BSB: Bringing Safe Browsing to Blockchain Platform. 524-543
Blockchain-Powered Systems
- Mengling Liu, Man Ho Au:
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. 547-560 - Ru Ray Raymond Chao, Joseph K. Liu, Kai Su:
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction. 561-579 - Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang:
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment. 580-597 - Ning Xi, Yajie Li, Jin Liu:
Decentralized Access Control for Secure Microservices Cooperation with Blockchain. 598-614 - Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras:
Blockchain-Based Access Control for Secure Smart Industry Management Systems. 615-630
Attacks
- Shyam Murthy, Srinivas Vivek:
Driver Locations Harvesting Attack on pRide. 633-648 - Shun Li, Guozhen Liu, Phuong Pham:
Rebound Attacks on sfSKINNY Hashing with Automatic Tools. 649-666 - Wei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao:
A Combination Reduction Algorithm and Its Application. 667-683
Cryptographic Algorithms and Protocols
- Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. 687-711 - Xiaoling Yu, Lei Xu, Xin Huang, Chungen Xu:
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security. 712-726 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Strengthening the Security of AES Against Differential Fault Attack. 727-744
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.