- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5-7, 2025.
The 22 full papers presented in this book were carefully reviewed and selected from 74 submissions.
The accepted papers cover multiple topics of cyber security and applied cryptography.
Contents
.- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment.
.- IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain.
.- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior.
.- Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives.
.- Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control.
.- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices.
.- HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection.
.- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection.
.- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention.
.- Post-quantum Blockchain Transaction Model Based on Dilithium.
.- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach.
.- Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing.
.- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment.
.- Real-Time Anomaly Detection for Event-based Insider Threat Hunting.
.- A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection.
.- Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples.
.- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features.
.- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs.
.- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis.



