LEADER 04005nam 22005415 450 001 996708273203316 005 20260203131145.0 010 $a981-9564-19-0 024 7 $a10.1007/978-981-95-6419-4 035 $a(CKB)45212350100041 035 $a(MiAaPQ)EBC32535965 035 $a(Au-PeEL)EBL32535965 035 $a(OCoLC)1572096390 035 $a(DE-He213)978-981-95-6419-4 035 $a(EXLCZ)9945212350100041 100 $a20260203d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security $e19th International Conference, NSS 2025, Wuhan, China, December 5?7, 2025, Proceedings /$fedited by Jiageng Chen, Debiao He, Wei Xie 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (0 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16326 311 08$a981-9564-18-2 327 $a -- Adaptive Layered Trustworthiness Assessment Model (ALTAM) for 5G Services Deployment. -- IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain. -- Prompt-in-Content Attacks: Exploiting Uploaded Inputs to Hijack LLM Behavior. -- Secure and Privacy-Preserving Load Forecasting in Smart Grids Through Blockchain-Based Incentives. -- Verifiable Quantum ABE: Binding Policy Evaluation to Post-Quantum Cryptography for Adaptive Access Control. -- A Lightweight Mutual Authentication and Key Exchange Protocol for Resource-Constrained IoMT Devices. -- HF-IDS: A Hybrid Method for Fine-Grained Known/Unknown Intrusion Detection. -- A ML-Driven Pipeline for Automated YARA Rule Extraction and Malware Detection. -- MEMC: A Lightweight Image-based Malware Classifier Based on Improved Shuffle and Coordination Attention. -- Post-quantum Blockchain Transaction Model Based on Dilithium. -- Towards Practical Automotive Intrusion Detection Systems: An Adaptive Rule-based Approach. -- Enhancing Configuration Security in Unmanned Systems via Static Analysis and Fuzz Testing. -- An Efficient and Secure Vector Comparison Protocol in a Dishonest Majority Environment. -- Real-Time Anomaly Detection for Event-based Insider Threat Hunting. -- A Distributed Privacy-Preserving Data Aggregation Scheme for Smart Grid with False Data Detection. -- Multimodal Learning with LLM-Fusion Head for Android Malware Detection: Enhancing Cross-Modality Robustness Against Obfuscation and Adversarial Samples. -- Make It Easy: Enhanced Detection of DNS Tunneling Tools over DoH using Standard Flow Features. -- An Efficient Tracing-Enabled SM2-Optimized Certificateless Aggregate Signature Scheme for VANETs. -- X-AdvIDS: A framework for assessing and improving the adversarial robustness of Intrusion Detection Systems with explainability-guided mutation and analysis. 330 $aThis book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5?7, 2025. The 22 full papers presented in this book were carefully reviewed and selected from 74 submissions. The accepted papers cover multiple topics of cyber security and applied cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16326 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aMobile and Network Security 606 $aSecurity Services 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 14$aMobile and Network Security. 615 24$aSecurity Services. 676 $a005.8 700 $aChen$b Jiageng$01737686 701 $aZhen$01886289 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996708273203316 996 $aNetwork and System Security$94540556 997 $aUNISA