Chen / He / Xie | Network and System Security | Buch | 978-981-956418-7 | www.sack.de

Buch, Englisch, Band 16326, 404 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 633 g

Reihe: Lecture Notes in Computer Science

Chen / He / Xie

Network and System Security

19th International Conference, NSS 2025, Wuhan, China, December 5-7, 2025, Proceedings
Erscheinungsjahr 2026
ISBN: 978-981-956418-7
Verlag: Springer

19th International Conference, NSS 2025, Wuhan, China, December 5-7, 2025, Proceedings

Buch, Englisch, Band 16326, 404 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 633 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-981-956418-7
Verlag: Springer


This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.

The 22 full papers presented in this book were carefully reviewed and selected from 74 submissions.

The accepted papers cover multiple topics of cyber security and applied cryptography.

Chen / He / Xie Network and System Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment.
.-  IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain.
.- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior.
.-  Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives.
.-  Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control.
.- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices.
.-  HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection.
.- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection.
.- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention.
.- Post-quantum Blockchain Transaction Model Based on Dilithium.
.- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach.
.-  Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing.
.- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment.
.- Real-Time Anomaly Detection for Event-based Insider Threat Hunting.
.-  A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection.
.-  Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples.
.- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features.
.- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs.
.- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.