Skip to main content
  • Conference proceedings
  • © 2013

Network and System Security

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings

  • Conference proceedings of the International Conference on Network and System Security

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7873)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NSS: International Conference on Network and System Security

Conference proceedings info: NSS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (71 papers)

  1. Front Matter

  2. NSS 2013 Regular Papers

    1. Network Security: Modeling and Evaluation

      1. Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study
        • Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro
        Pages 1-13
      2. A Technology Independent Security Gateway for Real-Time Multimedia Communication
        • Fudong Li, Nathan Clarke, Steven Furnell
        Pages 14-25
      3. Model the Influence of Sybil Nodes in P2P Botnets
        • Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi
        Pages 54-67
    2. Network Security: Security Protocols and Practice

      1. The OffPAD: Requirements and Usage
        • Kent Are Varmedal, Henning Klevjer, Joakim HovlandsvÃ¥g, Audun Jøsang, Johann Vincent, Laurent Miralabé
        Pages 80-93
      2. Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks
        • Sashi Gurung, Dan Lin, Anna Squicciarini, Elisa Bertino
        Pages 94-108
      3. Using Trusted Platform Modules for Location Assurance in Cloud Networking
        • Christoph Krauß, Volker Fusenig
        Pages 109-121
    3. Network Security: Network Attacks and Defense

      1. Tracing Sources of Anonymous Slow Suspicious Activities
        • Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
        Pages 122-134
      2. Static Analysis for Regular Expression Denial-of-Service Attacks
        • James Kirrage, Asiri Rathnayake, Hayo Thielecke
        Pages 135-148
      3. Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding
        • Gabriel Cartier, Jean-François Cartier, José M. Fernandez
        Pages 149-163
      4. Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
        • Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias
        Pages 164-177
    4. System Security: Malware and Intrusions

      1. MADS: Malicious Android Applications Detection through String Analysis
        • Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo G. Bringas
        Pages 178-191
      2. X-TIER: Kernel Module Injection
        • Sebastian Vogl, Fatih Kilic, Christian Schneider, Claudia Eckert
        Pages 192-205
      3. Leveraging String Kernels for Malware Detection
        • Jonas Pfoh, Christian Schneider, Claudia Eckert
        Pages 206-219
      4. Insiders Trapped in the Mirror Reveal Themselves in Social Media
        • Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis
        Pages 220-235
    5. System Security: Applications Security

      1. On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework
        • George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis
        Pages 236-249
      2. Using the Smart Card Web Server in Secure Branchless Banking
        • Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis
        Pages 250-263

Other Volumes

  1. Network and System Security

About this book

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Editors and Affiliations

  • Computer Science Department, ETSI Informatica, University of Malaga, Malaga, Spain

    Javier Lopez

  • School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China

    Xinyi Huang

  • Institute for Cyber Security,, University of Texas at San Antonio, San Antonio, USA

    Ravi Sandhu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access