{"title":"Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain","authors":"Mitsuyoshi Imamura, Kazumasa Omote","doi":"10.1007/978-3-030-36938-5_31","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_31","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-attributes-Based Trust Model of Internet of Vehicle","authors":"Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian","doi":"10.1007/978-3-030-36938-5_45","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_45","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132930485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration","authors":"Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma","doi":"10.1007/978-3-030-36938-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_32","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
{"title":"A Graph Database-Based Approach to Analyze Network Log Files","authors":"Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac","doi":"10.1007/978-3-030-36938-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_4","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125781354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks
{"title":"Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT","authors":"G. Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks","doi":"10.1007/978-3-030-36938-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_22","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130317504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Assessment of Enterprise Applications via Graphical Modelling","authors":"Manjunath Bilur, Anugrah Gari, R. Shyamasundar","doi":"10.1007/978-3-030-36938-5_9","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_9","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"37 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Raindrop and FBC","authors":"Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, K. Liang","doi":"10.1007/978-3-030-36938-5_33","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_33","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131048336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EEG-Based Person Authentication with Variational Universal Background Model","authors":"Huyen Tran, D. Tran, Wanli Ma, Phuoc Nguyen","doi":"10.1007/978-3-030-36938-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_25","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Liu, Hanxiao Xue, Guochen Wei, Lisu Wu, Yu Wang
{"title":"A Comparative Study on Network Traffic Clustering","authors":"Yang Liu, Hanxiao Xue, Guochen Wei, Lisu Wu, Yu Wang","doi":"10.1007/978-3-030-36938-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_27","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132065081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou
{"title":"New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost","authors":"Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou","doi":"10.1007/978-3-030-36938-5_35","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_35","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128169063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}