Muutke küpsiste eelistusi

E-raamat: Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings

Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 98,18 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020.





The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems.

Due to the Corona pandemic the event was held virtually.
Full Papers
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence
3(19)
Nan Sun
Jun Zhang
Shang Gao
Leo Yu Zhang
Seyit Camtepe
Yang Xiang
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets
22(20)
Purathani Praitheeshan
Lei Pan
Robin Doss
EnCoD: Distinguishing Compressed and Encrypted File Fragments
42(21)
Fabio De Gaspari
Dorjan Hitaj
Giulio Pagnotta
Lorenzo De Carli
Luigi V. Mancini
A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models
63(16)
Honglei Hui
Yongbo Zhi
Ning Xi
Yuanqing Liu
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
79(15)
Michael Kiperberg
Raz Ben Yehuda
Nezer J. Zaidenberg
Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives
94(18)
Takaya Yamazoe
Kazumasa Omote
Defending Against Package Typosquatting
112(20)
Matthew Taylor
Ruturaj Vaidya
Drew Davidson
Lorenzo De Carli
Vaibhav Rastogi
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
132(17)
Vatsal Patel
Lei Pan
Sutharshan Rajasegarar
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
149(18)
Lianyang Yu
Jiangshan Yu
Yevhen Zolotavkin
Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
167(20)
Mriganka Mandal
Koji Nuida
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
187(20)
Shoichi Hirose
Model Poisoning Defense on Federated Learning: A Validation Based Approach
207(17)
Yuao Wang
Tianqing Zhu
Wenhan Chang
Sheng Shen
Wei Ren
Fixing Vulnerabilities Automatically with Linters
224(21)
Willard Rafnsson
Rosario Giustolisi
Mark Kragerup
Mathias Hoyrup
Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay
245(16)
Anish Reddy Ellore
Sanket Mishra
Chittaranjan Hota
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking
261(16)
Wenjuan Li
Jiao Tan
Yu Wang
Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection
277(15)
Andreas Heidelbach Engly
Anton Ruby Larsen
Weizhi Meng
ACO Constructions of Secret Sharing Schemes - Accommodating New Parties
292(19)
Shion Samadder Chaudhury
Sabyasachi Dutta
Kouichi Sakurai
Short Papers
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality
311(16)
Bernd Prunster
Dominik Ziegler
Gerald Palfinger
A Model Specification Implementation for Trust Negotiation
327(15)
Martin Kolar
Carmen Fernandez Gago
Javier Lopez
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations
342(12)
Jingye Tang
Tianqing Zhu
Ping Xiong
Yu Wang
Wei Ren
PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences
354(17)
Fangfang Yang
Mohammad A. Islam
Shaolei Ren
On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks
371(17)
Fangfang Yang
Shaolei Ren
ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection
388(20)
Christopher Jun-Wen Chew
Vimal Kumar
Panos Patros
Robi Malik
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System
408(11)
Xiaodong Wang
Bruce Gu
Youyang Qu
Yongli Ren
Yong Xiang
Longxiang Gao
The Impact of Differential Privacy on Model Fairness in Federated Learning
419(12)
Xiuting Gu
Tianqing Zhu
Jie Li
Tao Zhang
Wei Ren
Evading Stepping-Stone Detection with Enough Chaff
431(16)
Henry Clausen
Michael S. Gibson
David Aspinall
Author Index 447