Fr. 101.00

Network and System Security - 19th International Conference, NSS 2025, Wuhan, China, December 5-7, 2025, Proceedings

English · Paperback / Softback

Will be released 05.02.2026

Description

Read more

This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5 7, 2025.
The 22 full papers presented in this book were carefully reviewed and selected from 74 submissions.
The accepted papers cover multiple topics of cyber security and applied cryptography.

List of contents

.- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment.
.-  IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain.
.- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior.
.-  Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives.
.-  Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control.
.- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices.
.-  HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection.
.- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection.
.- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention.
.- Post-quantum Blockchain Transaction Model Based on Dilithium.
.- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach.
.-  Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing.
.- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment.
.- Real-Time Anomaly Detection for Event-based Insider Threat Hunting.
.-  A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection.
.-  Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples.
.- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features.
.- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs.
.- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis.

Product details

Assisted by Jiageng Chen (Editor), Debiao He (Editor), Wei Xie (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Release 05.02.2026
 
EAN 9789819564187
ISBN 978-981-9564-18-7
No. of pages 372
Illustrations XX, 372 p.
Series Lecture Notes in Computer Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, cryptography, cloud security, Network Security, Mobile and Network Security, Security Services, systems security, Software and application security, Anonymity, human and societal aspects of security and privacy, Privacy-enhancing Techniques

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.