001441482 000__ 05109cam\a2200661Ii\4500 001441482 001__ 1441482 001441482 003__ OCoLC 001441482 005__ 20230309004741.0 001441482 006__ m\\\\\o\\d\\\\\\\\ 001441482 007__ cr\un\nnnunnun 001441482 008__ 220105s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001441482 019__ $$a1291147798$$a1291172676$$a1291316793$$a1292517580$$a1294351362 001441482 020__ $$a9783030927080$$q(electronic bk.) 001441482 020__ $$a3030927083$$q(electronic bk.) 001441482 020__ $$z9783030927073 001441482 020__ $$z3030927075 001441482 0247_ $$a10.1007/978-3-030-92708-0$$2doi 001441482 035__ $$aSP(OCoLC)1290840129 001441482 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dDKU$$dOCLCO$$dDCT$$dOCLCF$$dOCLCO$$dOCLCQ 001441482 049__ $$aISEA 001441482 050_4 $$aQA76.9.A25$$bI58 2021 001441482 08204 $$a005.8$$223 001441482 1112_ $$aInternational Conference on Network and System Security$$n(15th :$$d2021 :$$cTianjin, China) 001441482 24510 $$aNetwork and system security :$$b15th international conference, NSS 2021, Tianjin, China, October 23, 2021 : proceedings /$$cMin Yang, Chao Chen, Yang Liu (eds.). 001441482 24630 $$aNSS 2021 001441482 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001441482 264_4 $$c©2021 001441482 300__ $$a1 online resource :$$billustrations (some color). 001441482 336__ $$atext$$btxt$$2rdacontent 001441482 337__ $$acomputer$$bc$$2rdamedia 001441482 338__ $$aonline resource$$bcr$$2rdacarrier 001441482 347__ $$atext file$$bPDF$$2rda 001441482 4901_ $$aLecture notes in computer science ;$$v13041 001441482 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001441482 500__ $$aInternational conference proceedings. 001441482 500__ $$aIncludes author index. 001441482 5050_ $$aFull papers -- RLTree: Website Fingerprinting through ResourceLoading Tree -- Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments -- ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols -- Revocable Data Sharing Methodology Based on SGX and Blockchain -- On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices -- Preventing Fake News Propagation in Social Networks using a context Trust-based security model -- A Lightweight Android Malware Detection Framework based on Knowledge Distillation -- Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense -- A Simplified and Effective Solution for Hybrid SDN Network Deployment -- Group Key Exchange Compilers from Generic Key Exchanges -- An architecture for processing a dynamic heterogeneous information network of security intelligence -- The Complexity of Testing Cryptographic Devices on Input Faults -- A Malware Family Classification Method Based on the Point Cloud Model DGCNN -- Collection of the main Anti-Virus detection and bypass techniques -- Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks -- Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix -- Short papers -- Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector -- Cloud Key Management Based on Verifiable Secret Sharing -- A Scheme for Sensor Data Reconstruction in Smart Home -- Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation -- HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection -- Tracing Software Exploitation -- A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System -- Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. 001441482 506__ $$aAccess limited to authorized users. 001441482 520__ $$aThis book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021. The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. 001441482 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 13, 2022). 001441482 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001441482 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001441482 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001441482 655_7 $$aConference papers and proceedings.$$2lcgft 001441482 655_7 $$aActes de congrès.$$2rvmgf 001441482 655_0 $$aElectronic books. 001441482 7001_ $$aYang, Min,$$eeditor. 001441482 7001_ $$aChen, Chao,$$eeditor. 001441482 7001_ $$aLiu, Yang,$$eeditor. 001441482 77608 $$iPrint version: $$z3030927075$$z9783030927073$$w(OCoLC)1285162462 001441482 830_0 $$aLecture notes in computer science ;$$v13041. 001441482 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001441482 852__ $$bebk 001441482 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-92708-0$$zOnline Access$$91397441.1 001441482 909CO $$ooai:library.usi.edu:1441482$$pGLOBAL_SET 001441482 980__ $$aBIB 001441482 980__ $$aEBOOK 001441482 982__ $$aEbook 001441482 983__ $$aOnline 001441482 994__ $$a92$$bISE