


default search action
19th NSS 2025: Wuhan, China
- Jiageng Chen

, Debiao He
, Wei Xie
:
Network and System Security - 19th International Conference, NSS 2025, Wuhan, China, December 5-7, 2025, Proceedings. Lecture Notes in Computer Science 16326, Springer 2026, ISBN 978-981-95-6418-7 - Farhan Ahmad

, Muhammad Mansoor Alam, Muhammad Salman, Komal Batool:
Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH Using Standard Flow Features. 1-20 - Samra Bouakkaz

, Luis Carlos Suárez
, Nora Boulahia-Cuppens
, Frédéric Cuppens
:
Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment. 21-41 - Haosu Cheng, Guanquan Shi, Kangkang Zhang, Wenyu Zhang:

IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain. 42-58 - Joan Ferré-Queralt

, Jordi Castellà-Roca
, Alexandre Viejo
:
Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives. 59-76 - Zhenhua Han, Gang Shen

, Jiazheng Pei:
An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs. 77-98 - Linquan Huang, Chuanqi Chen, Bo Zhao, Hui Liu, Ke Zhang:

MEMC: A Lightweight Image-Based Malware Classifier Based on Improved Shuffle and Coordination Attention. 99-115 - Thibault Leblanc

, Neda Baghalizadeh-Moghadam, Frédéric Cuppens
, Nora Boulahia-Cuppens
:
Real-Time Anomaly Detection for Event-Based Insider Threat Hunting. 116-132 - Zexu Li, Kun Li, Jiakai Dou, Dazhong Liu, Shanshan Tu:

A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices. 133-145 - Zhuotao Lian, Weiyu Wang, Qingkui Zeng, Toru Nakanishi, Teruaki Kitasuka, Chunhua Su:

Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior. 146-160 - Qingyun Liu

, Fengtong Wen
:
An Improved PUF-Based Three-Factor Authentication Scheme for Industrial IoT. 161-175 - Luong Hoang Minh

, Duong The Dat, Dang Bui Tan Hai
, Le Duc Thinh
, Doan Minh Trung
, Phan The Duy
:
Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples. 176-195 - Gabriela Mogos

:
Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control. 196-212 - Nguyen Hoang Phuc, Dang Bui Tan Hai

, Nguyen Huu Quyen
, Phan The Duy
:
FraudTrace: Verifying Fraudulent News to Prevent Online Scam Campaigns via a Multi-agent LLM-Based System. 213-230 - Lucien Kiven Tamo, Brooke Kidmose

, Weizhi Meng, Thanassis Giannetsos:
Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-Based Approach. 231-252 - Phan The Duy

, Truong Thi Hoang Hao
, Nguyen Viet Hoang, Nguyen Duc Trung, Le Duc Thinh
, Doan Minh Trung
, Van-Hau Pham
:
X-AdvIDS: A Framework for Assessing and Improving the Adversarial Robustness of Intrusion Detection Systems with Explainability-Guided Mutation and Analysis. 253-271 - Haibo Tian

, Zhengdong Liang, Ting Zhang:
An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment. 272-292 - Souhayla Touk, Saad El Jaouhari

, Maurras Togbe
:
A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection. 293-313 - Linlin Wang

, Tianqing Zhu
, Laiqiao Qin, Lihua Yin
, Wanlei Zhou
:
Feature Machine Unlearning in Diffusion Models. 314-332 - Guangxia Xu, Yannan Guan, Lu Wang:

Post-quantum Blockchain Transaction Model Based on Dilithium. 333-349 - Xinyi Zhang, Peng Yu

, Yifei Wang, Mingwu Zhang
:
A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection. 350-365 - Tianming Zheng, Yixin Jiang, Feiyang Huang, Wenqian Xu, Zhihong Liang, Hua Li:

HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection. 366-385 - Zhiguo Zhang, Junyong Wang

, Chongzhen Zhang
, Jiao Dai
, Chong Liu, Fuqiang Hu, Dantong Yan, Hongquan Tian:
Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing. 386-401

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














