Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings

Author:   Mirosław Kutyłowski ,  Jun Zhang ,  Chao Chen
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12570
ISBN:  

9783030657444


Pages:   448
Publication Date:   19 December 2020
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $206.97 Quantity:  
Add to Cart

Share |

Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Mirosław Kutyłowski ,  Jun Zhang ,  Chao Chen
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12570
Weight:   0.706kg
ISBN:  

9783030657444


ISBN 10:   3030657442
Pages:   448
Publication Date:   19 December 2020
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.- Security Evaluation of Smart Contract-Based On-Chain Ethereum Wallets.- EnCoD Distinguishing Compressed and Encrypted File Fragments.- A Weighted Voting Framework for Android App’s Vetting Based on Multiple Machine Learning Models.- HyperWall A Hypervisor for Detection and Prevention of Malicious Communication.- Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives.- Defending Against Package Typosquatting.- Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network.- Game Theoretic Analysis of Reputation Approach on Block Withholding Attack.- Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging.- Compactly Committing Authenticated Encryption Using Tweakable Block Cipher.- Model Poisoning Defense on Federated Learning: A Validation Based Approach.- Fixing Vulnerabilities Automatically with Linters.- Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay.- A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.- Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection.- AC0 Constructions of Secret Sharing Schemes – Accommodating New Parties.- Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality.- A Model Specification Implementation for Trust Negotiation.- Privacy and Utility Trade-off for Textual Analysis via Calibrated Multivariate Perturbations.- PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences.- On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks.- ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection.- A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System.- The Impact of Differential Privacy on Model Fairness in Federated Learning.- Evading Stepping-Stone Detection with Enough Chaff.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List