Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings

Author:   Xingliang Yuan ,  Guangdong Bai ,  Cristina Alcaraz ,  Suryadipta Majumdar
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13787
ISBN:  

9783031230196


Pages:   747
Publication Date:   07 December 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $258.72 Quantity:  
Add to Cart

Share |

Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Xingliang Yuan ,  Guangdong Bai ,  Cristina Alcaraz ,  Suryadipta Majumdar
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13787
Weight:   1.151kg
ISBN:  

9783031230196


ISBN 10:   3031230191
Pages:   747
Publication Date:   07 December 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

AI for Network Security.- Vulnerability Detection Using Deep Learning Based Function Classification.- RAIDER: Reinforcement-aided Spear Phishing Detector.- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning.- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics.- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection.- Network Security.- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches.- Reducing Intrusion Alert Trees to Aid Visualization.- Attacker Attribution Through Characteristics Inference Using Honeypot Data.- Detecting Contradictions from CoAP RFC Based on Knowledge Graph.- Mobile Security.- A First Look at Android Apps' Third-party Resources Loading.- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset.- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices.- A Beyond-5G Authentication and Key Agreement Protocol.- IoT Security.- A Survey on IoT Vulnerability Discovery.- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks.- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.- Privacy-Preserving Machine Learning Protocols and Systems.- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning.- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.- An Efficient Clustering-Based Privacy-Preserving Recommender System.- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.- Privacy-Preserving Networked Systems and Protocols.- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server.- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare.- Enabling Secure Deduplication in Encrypted Decentralized Storage.- Geometric Range Searchable Encryption with Forward and Backward Security.- Blockchain Security.- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach.- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.- BSB: Bringing Safe Browsing to Blockchain Platform.- Blockchain-Powered Systems.- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks.- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction.- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment.- Decentralized Access Control for Secure Microservices Cooperation with Blockchain.- Blockchain-Based Access Control for Smart Manufacturer Secure Management System.- Attacks.- Driver Locations Harvesting Attack on pRide.- Rebound Attacks on SKINNY Hashing with Automatic Tools.- Combination Reduction Algorithms and its Application to Subversion Attack.- Cryptographic Algorithms and Protocols.- Evaluating the Security of Merkle-Damg ard Hash Functions and Combiners in Quantum Settings.- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security.- Strengthening the Security of AES Against Differential Fault Attack

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List