


default search action
16th NSS 2022: Denarau Island, Fiji
- Xingliang Yuan
, Guangdong Bai
, Cristina Alcaraz, Suryadipta Majumdar
:
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13787, Springer 2022, ISBN 978-3-031-23019-6
AI for Network Security
- Huihui Gong
, Siqi Ma
, Seyit Camtepe
, Surya Nepal
, Chang Xu
:
Vulnerability Detection Using Deep Learning Based Function Classification. 3-22 - Keelan Evans, Alsharif Abuadbba
, Tingmin Wu
, Kristen Moore
, Mohiuddin Ahmed
, Ganna Pogrebna
, Surya Nepal
, Mike Johnstone
:
RAIDER: Reinforcement-Aided Spear Phishing Detector. 23-50 - Yunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan:
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning. 51-65 - Stuart W. Hall, Amin Sakzad, Sepehr Minagar:
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics. 66-85 - Wei Hong
, Jiao Yin
, Mingshan You
, Hua Wang
, Jinli Cao
, Jianxin Li
, Ming Liu
:
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. 86-102
Network Security
- Siqi Xia
, Sutharshan Rajasegarar
, Christopher Leckie
, Sarah M. Erfani
, Jeffrey Chan
:
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. 105-119 - Kurt Friday, Elias Bou-Harb, Jorge Crichigno:
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches. 120-139 - Eric Ficke
, Raymond M. Bateman
, Shouhuai Xu
:
Reducing Intrusion Alert Trees to Aid Visualization. 140-154 - Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens:
Attacker Attribution via Characteristics Inference Using Honeypot Data. 155-169 - Xinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo:
Detecting Contradictions from CoAP RFC Based on Knowledge Graph. 170-189
Mobile Security
- Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar:
A First Look at Android Apps' Third-Party Resources Loading. 193-213 - Shuang Zhao
, Jincheng Zhong
, Shuhui Chen
, Jianbing Liang
:
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset. 214-232 - Bo Yang
, Yanchao Zhang, Dong Tong:
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices. 233-248 - Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian
, Valtteri Niemi:
A Beyond-5G Authentication and Key Agreement Protocol. 249-264
IoT Security
- Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
:
A Survey on IoT Vulnerability Discovery. 267-282 - Jiani Fan
, Lwin Khin Shar
, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam:
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. 283-304 - Tianqi Zhou, Wenying Zheng, Haowen Tan:
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. 305-318 - Bhagyashri Tushir
, Yuhong Liu
, Behnam Dezfouli
:
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection. 319-334 - Lei Shi, Shanti Krishnan
, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. 335-353
Privacy-Preserving Machine Learning Protocols and Systems
- Han Xu
, Priyadarsi Nanda
, Jie Liang
, Xiangjian He
:
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning. 357-373 - Yang Hong, Lisong Wang, Weizhi Meng
, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang:
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication. 374-386 - Junwei Luo
, Xun Yi
, Fengling Han
, Xuechao Yang
, Xu Yang:
An Efficient Clustering-Based Privacy-Preserving Recommender System. 387-405 - Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu
, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. 406-425
Privacy-Preserving Networked Systems and Protocols
- Hongcheng Xie
, Zizhuo Chen
, Yu Guo, Qin Liu
, Xiaohua Jia:
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server. 429-442 - Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui, Fei Zhu
:
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare. 443-458 - Bo Zhang, Helei Cui
, Yaxing Chen, Xiaoning Liu, Zhiwen Yu, Bin Guo:
Enabling Secure Deduplication in Encrypted Decentralized Storage. 459-475 - Mengwei Yang, Chungen Xu
, Pan Zhang:
Geometric Range Searchable Encryption with Forward and Backward Security. 476-495
Blockchain Security
- Yining Xie, Xin Kang
, Tieyan Li
, Cheng-Kang Chu
, Haiguang Wang:
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach. 499-513 - Fokke Heikamp
, Lei Pan
, Rolando Trujillo-Rasua
, Sushmita Ruj
, Robin Doss
:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. 514-523 - Zhuang Zhou, Cheng Tan
, Shiyun Liu, Rongwei Yu, Siwei Wu
, Shengwu Xiong
:
BSB: Bringing Safe Browsing to Blockchain Platform. 524-543
Blockchain-Powered Systems
- Mengling Liu
, Man Ho Au
:
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. 547-560 - Ru Ray Raymond Chao, Joseph K. Liu, Kai Su:
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction. 561-579 - Zoey Ziyi Li
, Joseph K. Liu
, Jiangshan Yu
, Dragan Gasevic
, Wayne Yang:
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment. 580-597 - Ning Xi, Yajie Li, Jin Liu:
Decentralized Access Control for Secure Microservices Cooperation with Blockchain. 598-614 - Aditya Pribadi Kalapaaking
, Ibrahim Khalil
, Mohammad Saidur Rahman
, Abdelaziz Bouras
:
Blockchain-Based Access Control for Secure Smart Industry Management Systems. 615-630
Attacks
- Shyam Murthy
, Srinivas Vivek
:
Driver Locations Harvesting Attack on pRide. 633-648 - Shun Li
, Guozhen Liu
, Phuong Pham
:
Rebound Attacks on sfSKINNY Hashing with Automatic Tools. 649-666 - Wei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao:
A Combination Reduction Algorithm and Its Application. 667-683
Cryptographic Algorithms and Protocols
- Zhenzhen Bao
, Jian Guo
, Shun Li
, Phuong Pham
:
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. 687-711 - Xiaoling Yu
, Lei Xu, Xin Huang, Chungen Xu:
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security. 712-726 - Anit Kumar Ghosal
, Dipanwita Roychowdhury
:
Strengthening the Security of AES Against Differential Fault Attack. 727-744

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.