| 2025 | Network and System Security - 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings Houbing Herbert Song, Roberto Di Pietro, Saed Alrabaee, Mohammad Tubishat, Mousa Al-Kfairy, Omar Alfandi |
| 2024 | AndroPROTECT: Hardening the Android API Against Fingerprinting. Gerald Palfinger |
| 2024 | Auditing and Attributing Behaviours of Suspicious Android Health Applications. Muhammad Salman, I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar |
| 2024 | Credential Issuance Transparency: A Privacy-Preserving Audit Log of Credential Issuance. Edona Fasllija, Jakob Heher, Stefan More |
| 2024 | Decentralized Data Usage Control with Confidential Data Processing on Trusted Execution Environment and Distributed Ledger Technology. Shota Tokuda, Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito |
| 2024 | Decoding Android Malware with a Fraction of Features: An Attention-Enhanced MLP-SVM Approach. Safayat Bin Hakim, Muhammad Adil, Kamal Acharya, Houbing Herbert Song |
| 2024 | Enhancing Network Security Through Vulnerability Monitoring. Ryan Williams, Anthony Gavazzi, Engin Kirda |
| 2024 | Every Sherlock Needs a Watson: Practical Semi-realtime Attack Elaboration System. Zeya Umayya, Arpit Nandi, Amartyo Roy, Sambuddho Chakravarty |
| 2024 | How to Accomplish Key and Communication Compression Over Authentication Channels - Proxy Re-authentication and Its Instantiations. Yoshiro Matsuoka, Sohto Chiku, Keisuke Hara, Junji Shikata |
| 2024 | Identifying the Origins of Business Data Breaches Through CTC Detection. Gayle Frisbie, Omar A. Darwish, Anas M. R. Alsobeh, Abdallah Al-shorman |
| 2024 | Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices. David Monschein, Oliver P. Waldhorst |
| 2024 | PPDL: Efficient Dropout-Resilient Aggregation for Privacy-Preserving Decentralized Learning. Ali Reza Ghavamipour, Benjamin Zi Hao Zhao, Fatih Turkmen |
| 2024 | PQS-BC: Comparative Analysis of NIST Post-quantum Signatures for Blockchain. Wan Kai Wong, Naipeng Dong, Cong Minh Dinh |
| 2024 | Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks. Yazan Alahmed, Reema Abadla, Mahmoud Khasawneh |
| 2024 | RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks. Hiroki Kuzuno, Toshihiro Yamauchi |
| 2024 | Revisiting Binary Code Authorship Analysis. Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, Jie Tang |
| 2024 | SPVPC: Smart Contract Based Publicly Verifiable Polynomial Computations. Partha Sarathi Chakraborty, Somanath Tripathy |
| 2024 | Sharing Is (S)caring: Security and Privacy Issues in Decentralized Physical Infrastructure Networks (DePIN). Maurantonio Caprolu, Simone Raponi, Roberto Di Pietro |
| 2024 | Towards a Malware Family Classification Model Using Static Call Graph Instruction Visualization. Attila Mester, Zalán Bodó, P. Vinod, Mauro Conti |
| 2024 | VoIP Vanguard: A Practical Front Line Defense Against VoIP Identification Attacks in Tor. S. Jithin, Richa Gupta, Reeshabh Kumar Ranjan, Shreyansh Nagpal, Mukulika Maity, Sambuddho Chakravarty |
| 2024 | VulMatch: Binary-Level Vulnerability Detection Through Signature. Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu |
| 2024 | You Can't Touch This: Detecting Typosquatting Packages for Enhanced Malware Prevention in Software Supply Chains. Minh Tien Truong, Nils Gruschka, Luigi Lo Iacono |