Network and System Security 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings /
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2020.
|
Edition: | 1st ed. 2020. |
Series: | LNCS sublibrary. Security and cryptology ;
12570. |
Subjects: | |
Online Access: | Full text (Wentworth users only) |
Table of Contents:
- Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence
- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets
- EnCoD Distinguishing Compressed and Encrypted File Fragments
- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models
- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication
- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives
- Defending Against Package Typosquatting
- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
- Model Poisoning Defense on Federated Learning: A Validation Based Approach
- Fixing Vulnerabilities Automatically with Linters
- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay
- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking
- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection
- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties
- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality
- A Model Specification Implementation for Trust Negotiation
- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations
- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences
- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks
- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection
- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System
- The Impact of Differential Privacy on Model Fairness in Federated Learning
- Evading Stepping-Stone Detection with Enough Chaff.