Network and System Security: 19th International Conference, NSS 2025, Wuhan, China, December 5–7, 2025, Proceedings

Author:   Jiageng Chen ,  Debiao He ,  Wei Xie
Publisher:   Springer Verlag, Singapore
ISBN:  

9789819564187


Pages:   404
Publication Date:   04 February 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Network and System Security: 19th International Conference, NSS 2025, Wuhan, China, December 5–7, 2025, Proceedings


Overview

This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025. The 22 full papers presented in this book were carefully reviewed and selected from 74 submissions. The accepted papers cover multiple topics of cyber security and applied cryptography.

Full Product Details

Author:   Jiageng Chen ,  Debiao He ,  Wei Xie
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Verlag, Singapore
ISBN:  

9789819564187


ISBN 10:   9819564182
Pages:   404
Publication Date:   04 February 2026
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment. .-  IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain. .- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior. .-  Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives. .-  Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control. .- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices. .-  HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection. .- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection. .- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention. .- Post-quantum Blockchain Transaction Model Based on Dilithium. .- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach. .-  Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing. .- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment. .- Real-Time Anomaly Detection for Event-based Insider Threat Hunting. .-  A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection. .-  Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples. .- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features. .- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs. .- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

RGFEB26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List