| 2017 | 5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. Lauri Isotalo |
| 2017 | A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang |
| 2017 | A Detecting Method of Array Bounds Defects Based on Symbolic Execution. Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu |
| 2017 | A Discrete Wavelet Transform Approach to Fraud Detection. Roberto Saia |
| 2017 | A Formal Approach for Network Security Policy Relevancy Checking. Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
| 2017 | A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. Keita Emura |
| 2017 | A Generic yet Efficient Method for Secure Inner Product. Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong |
| 2017 | A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma |
| 2017 | A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen |
| 2017 | A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue |
| 2017 | A Quantitative Method for Evaluating Network Security Based on Attack Graph. Yukun Zheng, Kun Lv, Changzhen Hu |
| 2017 | A Role-Based Access Control System for Intelligent Buildings. Nian Xue, Chenglong Jiang, Xin Huang, Dawei Liu |
| 2017 | A State Recovery Attack on ACORN-v1 and ACORN-v2. Deepak Kumar Dalai, Dibyendu Roy |
| 2017 | A Systematic Analysis of Random Forest Based Social Media Spam Classification. Mohammed Al-Janabi, Peter Andras |
| 2017 | Access Control Model for AWS Internet of Things. Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu |
| 2017 | Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. Leyou Zhang, Qing Wu |
| 2017 | An Android Vulnerability Detection System. Jiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu |
| 2017 | An Automatic Vulnerabilities Classification Method Based on Their Relevance. Hao Zhang, Kun Lv, Changzhen Hu |
| 2017 | Application Research on Network Attacks and Defenses with Zachman Framework. Chensi Wu, Yuqing Zhang, Ying Dong |
| 2017 | Area-Dividing Route Mutation in Moving Target Defense Based on SDN. Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang |
| 2017 | Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies. Michal Zima |
| 2017 | Concealing IMSI in 5G Network Using Identity Based Encryption. Mohsin Khan, Valtteri Niemi |
| 2017 | CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy. Somanath Tripathy, Praveen Kumar |
| 2017 | Covert Channels Implementation and Detection in Virtual Environments. Irina Mihai, Catalin Adrian Leordeanu, Alecsandru Patrascu |
| 2017 | Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. Jayaprakash Kar |
| 2017 | DNA-Droid: A Real-Time Android Ransomware Detection Framework. Amirhossein Gharib, Ali A. Ghorbani |
| 2017 | Defenses Against Wormhole Attacks in Wireless Sensor Networks. Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang |
| 2017 | Detecting DNS Tunneling Using Ensemble Learning. Saeed Shafieian, Daniel Smith, Mohammad Zulkernine |
| 2017 | EEG-Based Random Number Generators. Dang Nguyen, Dat Tran, Wanli Ma, Khoa Nguyen |
| 2017 | Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. Deepak Kumar Dalai, Pinaki Sarkar |
| 2017 | Experiences in Trusted Cloud Computing. Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas |
| 2017 | Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks. Ahmad M. K. Nasser, Di Ma, Sam Lauzon |
| 2017 | Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li |
| 2017 | Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things. Thomas W. Pieber, Thomas Ulz, Christian Steger, Rainer Matischek |
| 2017 | Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption. Patrick Eitschberger, Jörg Keller, Simon Holmbacka |
| 2017 | IPsec and IKE as Functions in SDN Controlled Network. Markku Vajaranta, Joona Kannisto, Jarmo Harju |
| 2017 | Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU. Naoki Nishikawa, Hideharu Amano, Keisuke Iwai |
| 2017 | Improving Alert Accuracy for Smart Vehicles. Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang |
| 2017 | Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS). Pinaki Sarkar |
| 2017 | Machine Learning for Analyzing Malware. Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang |
| 2017 | Mind Your Right to Know: On De-anonymization Auditability in V2X Communications. Tommi Meskanen, Masoud Naderpour, Valtteri Niemi |
| 2017 | Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu |
| 2017 | Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola |
| 2017 | OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian |
| 2017 | Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. Yun Chen, Kun Lv, Changzhen Hu |
| 2017 | Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web Environment. Rendon Sánchez Angel Mecías, Octavio José Salcedo Parra, Correa Sánchez Lewys |
| 2017 | Privacy Verification Chains for IoT. Noria Foukia, David Billard, Eduardo Solana |
| 2017 | Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers. Le Trieu Phong |
| 2017 | Private Membership Test Protocol with Low Communication Complexity. Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi |
| 2017 | Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen |
| 2017 | Randomization Can't Stop BPF JIT Spray. Elena Reshetova, Filippo Bonazzi, N. Asokan |
| 2017 | Risk Modelling of Blockchain Ecosystem. Igor Kabashkin |
| 2017 | Safety of ABAC _\alpha Is Decidable. Tahmina Ahmed, Ravi S. Sandhu |
| 2017 | Subscriber Profile Extraction and Modification via Diameter Interconnection. Silke Holtmanns, Yoan Miche, Ian Oliver |
| 2017 | SulleyEX: A Fuzzer for Stateful Network Protocol. Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao |
| 2017 | Survey on Big Data Analysis Algorithms for Network Security Measurement. Hanlu Chen, Yulong Fu, Zheng Yan |
| 2017 | The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. Joona Kannisto, Jarmo Harju |
| 2017 | Tor De-anonymisation Techniques. Juha Nurmi, Mikko S. Niemelä |
| 2017 | Towards Dependably Detecting Geolocation of Cloud Servers. Leo Hippelainen, Ian Oliver, Shankar Lal |
| 2017 | \mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle |