default search action
14th NSS 2020: Melbourne, VIC, Australia
- Miroslaw Kutylowski, Jun Zhang, Chao Chen:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4
Full Papers
- Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. 3-21 - Purathani Praitheeshan, Lei Pan, Robin Doss:
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. 22-41 - Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. 42-62 - Honglei Hui, Yongbo Zhi, Ning Xi, Yuanqing Liu:
A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models. 63-78 - Michael Kiperberg, Raz Ben Yehuda, Nezer J. Zaidenberg:
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication. 79-93 - Takaya Yamazoe, Kazumasa Omote:
Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives. 94-111 - Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli, Vaibhav Rastogi:
Defending Against Package Typosquatting. 112-131 - Vatsal Patel, Lei Pan, Sutharshan Rajasegarar:
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network. 132-148 - Lianyang Yu, Jiangshan Yu, Yevhen Zolotavkin:
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack. 149-166 - Mriganka Mandal, Koji Nuida:
Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging. 167-186 - Shoichi Hirose:
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher. 187-206 - Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen, Wei Ren:
Model Poisoning Defense on Federated Learning: A Validation Based Approach. 207-223 - Willard Rafnsson, Rosario Giustolisi, Mark Kragerup, Mathias Høyrup:
Fixing Vulnerabilities Automatically with Linters. 224-244 - Anish Reddy Ellore, Sanket Mishra, Chittaranjan Hota:
Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay. 245-260 - Wenjuan Li, Jiao Tan, Yu Wang:
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. 261-276 - Andreas Heidelbach Engly, Anton Ruby Larsen, Weizhi Meng:
Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection. 277-291 - Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. 292-308
Short Papers
- Bernd Prünster, Dominik Ziegler, Gerald Palfinger:
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality. 311-326 - Martin Kolár, M. Carmen Fernández Gago, Javier López:
A Model Specification Implementation for Trust Negotiation. 327-341 - Jingye Tang, Tianqing Zhu, Ping Xiong, Yu Wang, Wei Ren:
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations. 342-353 - Fangfang Yang, Mohammad A. Islam, Shaolei Ren:
PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences. 354-370 - Fangfang Yang, Shaolei Ren:
On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks. 371-387 - Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection. 388-407 - Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang, Longxiang Gao:
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System. 408-418 - Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren:
The Impact of Differential Privacy on Model Fairness in Federated Learning. 419-430 - Henry Clausen, Michael Scott Gibson, David Aspinall:
Evading Stepping-Stone Detection with Enough Chaff. 431-446
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.