| 2022 | A Beyond-5G Authentication and Key Agreement Protocol. Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi |
| 2022 | A Combination Reduction Algorithm and Its Application. Wei Yang, Shao-Jun Yang, Wei Wu, Yong Zhao |
| 2022 | A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang, Robin Doss |
| 2022 | A First Look at Android Apps' Third-Party Resources Loading. Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram, Gareth Tyson, Mohamed Ali Kâafar |
| 2022 | A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches. Kurt Friday, Elias Bou-Harb, Jorge Crichigno |
| 2022 | A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication. Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang |
| 2022 | A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics. Stuart W. Hall, Amin Sakzad, Sepehr Minagar |
| 2022 | A Survey on IoT Vulnerability Discovery. Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang |
| 2022 | An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. Tianqi Zhou, Wenying Zheng, Haowen Tan |
| 2022 | An Efficient Clustering-Based Privacy-Preserving Recommender System. Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang, Xu Yang |
| 2022 | An Efficient Lattice-Based Encrypted Search Scheme with Forward Security. Xiaoling Yu, Lei Xu, Xin Huang, Chungen Xu |
| 2022 | Attacker Attribution via Characteristics Inference Using Honeypot Data. Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens |
| 2022 | BSB: Bringing Safe Browsing to Blockchain Platform. Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu, Shengwu Xiong |
| 2022 | Blockchain Based Regulatory Technology Deployment for Real Estate Transaction. Ru Ray Raymond Chao, Joseph K. Liu, Kai Su |
| 2022 | Blockchain-Based Access Control for Secure Smart Industry Management Systems. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras |
| 2022 | CVallet: A Blockchain-Oriented Application Development for Education and Recruitment. Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang |
| 2022 | Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset. Shuang Zhao, Jincheng Zhong, Shuhui Chen, Jianbing Liang |
| 2022 | DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices. Bo Yang, Yanchao Zhang, Dong Tong |
| 2022 | Decentralized Access Control for Secure Microservices Cooperation with Blockchain. Ning Xi, Yajie Li, Jin Liu |
| 2022 | Detecting Contradictions from CoAP RFC Based on Knowledge Graph. Xinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo |
| 2022 | Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam |
| 2022 | Driver Locations Harvesting Attack on pRide. Shyam Murthy, Srinivas Vivek |
| 2022 | Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare. Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui, Fei Zhu |
| 2022 | Enabling Secure Deduplication in Encrypted Decentralized Storage. Bo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu, Bin Guo |
| 2022 | Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham |
| 2022 | Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan |
| 2022 | Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss |
| 2022 | Geometric Range Searchable Encryption with Forward and Backward Security. Mengwei Yang, Chungen Xu, Pan Zhang |
| 2022 | Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. Wei Hong, Jiao Yin, Mingshan You, Hua Wang, Jinli Cao, Jianxin Li, Ming Liu |
| 2022 | Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection. Bhagyashri Tushir, Yuhong Liu, Behnam Dezfouli |
| 2022 | Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning. Yunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan |
| 2022 | Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar |
| 2022 | Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. Mengling Liu, Man Ho Au |
| 2022 | Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server. Hongcheng Xie, Zizhuo Chen, Yu Guo, Qin Liu, Xiaohua Jia |
| 2022 | RAIDER: Reinforcement-Aided Spear Phishing Detector. Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone |
| 2022 | Rebound Attacks on sfSKINNY Hashing with Automatic Tools. Shun Li, Guozhen Liu, Phuong Pham |
| 2022 | Reducing Intrusion Alert Trees to Aid Visualization. Eric Ficke, Raymond M. Bateman, Shouhuai Xu |
| 2022 | Strengthening the Security of AES Against Differential Fault Attack. Anit Kumar Ghosal, Dipanwita Roychowdhury |
| 2022 | Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang |
| 2022 | The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning. Han Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He |
| 2022 | Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach. Yining Xie, Xin Kang, Tieyan Li, Cheng-Kang Chu, Haiguang Wang |
| 2022 | Vulnerability Detection Using Deep Learning Based Function Classification. Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu |