Get Free Shipping on orders over $79
Network and System Security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings - Chao Chen

Network and System Security

15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings

By: Chao Chen (Editor), Yang Liu (Editor), Min Yang (Editor)

Paperback | 5 January 2022

At a Glance

Paperback


$129.00

or 4 interest-free payments of $32.25 with

 or 

Ships in 7 to 10 business days

Full papers.- RLTree: Website Fingerprinting through ResourceLoading Tree.- Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments.- ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols.- Revocable Data Sharing Methodology Based on SGX and Blockchain.- On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices.- Preventing Fake News Propagation in Social Networks using a context Trust-based security model.- A Lightweight Android Malware Detection Framework based on Knowledge Distillation.- Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense.- A Simplified and Effective Solution for Hybrid SDN Network Deployment.- Group Key Exchange Compilers from Generic Key Exchanges.- An architecture for processing a dynamic heterogeneous information network of security intelligence.- The Complexity of Testing Cryptographic Devices on Input Faults.- A Malware Family Classification Method Based on the Point Cloud Model DGCNN.- Collection of the main Anti-Virus detection and bypass techniques.- Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks.- Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix.- Short papers.- Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector.- Cloud Key Management Based on Verifiable Secret Sharing.- A Scheme for Sensor Data Reconstruction in Smart Home.- Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation.- HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection.- Tracing Software Exploitation.- A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System.- Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.

More in Coding Theory & Cryptology

Computer Coding Python Games for Kids : DK Help Your Kids With - Carol Vorderman
New Storytelling : Learning through Metaphors - Anna Ursyn

RRP $110.00

$96.75

12%
OFF
Cybersecurity and the Art of Cyberwar - Dan Shoemaker
SSH, The Secure Shell : Definitive Guide Ser. - Daniel J Barrett

RRP $85.75

$43.75

49%
OFF
Introduction to Modern Cryptography : Revised Third Edition - Jonathan Katz
Unveiling the Art of Steganography : A Modern Approach - Urmila Pilania
How to Prove It : A Structured Approach - Daniel J. Velleman

RRP $73.95

$70.75

Code Appreciation : Reshaping Knowledge - Anna Ursyn

RRP $110.00

$96.75

12%
OFF