Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Network and System Security

19th International Conference, NSS 2025, Wuhan, China, December 5–7, 2025, Proceedings

Jiageng Chen, Debiao He, Wei Xie (Herausgeber)

Buch | Softcover
372 Seiten
2026
Springer Verlag, Singapore
978-981-95-6418-7 (ISBN)
CHF 109,95 inkl. MwSt
  • Titel nicht im Sortiment
  • Artikel merken
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.


The 22 full papers presented in this book were carefully reviewed and selected from 74 submissions.


The accepted papers cover multiple topics of cyber security and applied cryptography.

.- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment.
.-  IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain.
.- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior.
.-  Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives.
.-  Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control.
.- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices.
.-  HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection.
.- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection.
.- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention.
.- Post-quantum Blockchain Transaction Model Based on Dilithium.
.- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach.
.-  Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing.
.- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment.
.- Real-Time Anomaly Detection for Event-based Insider Threat Hunting.
.-  A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection.
.-  Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples.
.- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features.
.- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs.
.- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis.

Erscheint lt. Verlag 5.2.2026
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XX, 372 p.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte anonymity • Cloud Security • cryptography • Human and societal aspects of security and privacy • Network Security • Privacy-enhancing techniques • software and application security • Systems Security
ISBN-10 981-95-6418-2 / 9819564182
ISBN-13 978-981-95-6418-7 / 9789819564187
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95