


default search action
14th NSS 2020: Melbourne, VIC, Australia
- Miroslaw Kutylowski

, Jun Zhang
, Chao Chen
:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4
Full Papers
- Nan Sun

, Jun Zhang, Shang Gao, Leo Yu Zhang
, Seyit Camtepe
, Yang Xiang
:
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. 3-21 - Purathani Praitheeshan

, Lei Pan
, Robin Doss
:
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. 22-41 - Fabio De Gaspari

, Dorjan Hitaj
, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. 42-62 - Honglei Hui, Yongbo Zhi, Ning Xi, Yuanqing Liu:

A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models. 63-78 - Michael Kiperberg, Raz Ben Yehuda, Nezer J. Zaidenberg

:
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication. 79-93 - Takaya Yamazoe, Kazumasa Omote:

Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives. 94-111 - Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli

, Vaibhav Rastogi:
Defending Against Package Typosquatting. 112-131 - Vatsal Patel

, Lei Pan
, Sutharshan Rajasegarar
:
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network. 132-148 - Lianyang Yu, Jiangshan Yu

, Yevhen Zolotavkin:
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack. 149-166 - Mriganka Mandal

, Koji Nuida
:
Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging. 167-186 - Shoichi Hirose

:
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher. 187-206 - Yuao Wang

, Tianqing Zhu
, Wenhan Chang
, Sheng Shen
, Wei Ren
:
Model Poisoning Defense on Federated Learning: A Validation Based Approach. 207-223 - Willard Rafnsson, Rosario Giustolisi

, Mark Kragerup, Mathias Høyrup:
Fixing Vulnerabilities Automatically with Linters. 224-244 - Anish Reddy Ellore, Sanket Mishra

, Chittaranjan Hota
:
Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay. 245-260 - Wenjuan Li

, Jiao Tan, Yu Wang:
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. 261-276 - Andreas Heidelbach Engly, Anton Ruby Larsen, Weizhi Meng

:
Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection. 277-291 - Shion Samadder Chaudhury, Sabyasachi Dutta

, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. 292-308
Short Papers
- Bernd Prünster

, Dominik Ziegler
, Gerald Palfinger
:
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality. 311-326 - Martin Kolár

, M. Carmen Fernández Gago, Javier López:
A Model Specification Implementation for Trust Negotiation. 327-341 - Jingye Tang, Tianqing Zhu, Ping Xiong, Yu Wang, Wei Ren:

Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations. 342-353 - Fangfang Yang, Mohammad A. Islam

, Shaolei Ren:
PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences. 354-370 - Fangfang Yang, Shaolei Ren:

On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks. 371-387 - Christopher Jun-Wen Chew

, Vimal Kumar
, Panos Patros
, Robi Malik:
ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection. 388-407 - Xiaodong Wang

, Bruce Gu, Youyang Qu
, Yongli Ren, Yong Xiang, Longxiang Gao:
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System. 408-418 - Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren:

The Impact of Differential Privacy on Model Fairness in Federated Learning. 419-430 - Henry Clausen, Michael Scott Gibson, David Aspinall:

Evading Stepping-Stone Detection with Enough Chaff. 431-446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














