Network and System Security 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings /

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kutyłowski, Mirosław (Editor), Zhang, Jun (Editor), Chen, Chao (Editor)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2020.
Edition:1st ed. 2020.
Series:LNCS sublibrary. Security and cryptology ; 12570.
Subjects:
Online Access:Full text (Wentworth users only)
Table of Contents:
  • Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence
  • Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets
  • EnCoD Distinguishing Compressed and Encrypted File Fragments
  • A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models
  • HyperWall A Hypervisor for Detection and Prevention of Malicious Communication
  • Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives
  • Defending Against Package Typosquatting
  • Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
  • Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
  • Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
  • Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
  • Model Poisoning Defense on Federated Learning: A Validation Based Approach
  • Fixing Vulnerabilities Automatically with Linters
  • Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay
  • A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking
  • Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection
  • AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties
  • Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality
  • A Model Specification Implementation for Trust Negotiation
  • Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations
  • PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences
  • On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks
  • ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection
  • A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System
  • The Impact of Differential Privacy on Model Fairness in Federated Learning
  • Evading Stepping-Stone Detection with Enough Chaff.