Selection and Performance Analysis of CICIDS2017 Features Importance
|
2020 |
Reis, Bruno |
Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and
|
2020 |
Nogues, Maël |
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control
|
2020 |
Servos, Daniel |
Dynamic Searchable Encryption with Access Control
|
2020 |
Blömer, Johannes |
Validating the DFA Attack Resistance of AES (Short Paper)
|
2020 |
Sugimoto, Hakuei |
A Privacy Protection Layer for Wearable Devices
|
2020 |
Mohzary, Muhammad |
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks
|
2020 |
Mansouri, Mohamad |
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles
|
2020 |
Shirazi, Hossein |
Ransomware Network Traffic Analysis for Pre-encryption Alert
|
2020 |
Moussaileb, Routa |
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis
|
2020 |
Briguglio, William |
Get-your-ID: Decentralized Proof of Identity
|
2020 |
Lafourcade, Pascal |
Towards Privacy-Aware Smart Surveillance
|
2020 |
Shirima, Emil |
Command dependencies in heuristic safety analysis of access control models
|
2020 |
Amthor, Peter |
Semantic Representation Based on Deep Learning for Spam Detection
|
2020 |
Saidani, Nadjate |
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS
|
2020 |
Yang, Meng |
Enroll, and Authentication Will Follow: eID-Based Enrollment for a Customized, Secture, and Frictionless Authentication Experience
|
2020 |
Ranise, Silvio |
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE
|
2020 |
Preuveneers, Davy |
On Attribute Retrieval in ABAC
|
2020 |
Morisset, Charles |
Protecting Android Apps from Repackaging Using Native Code
|
2020 |
Tanner, Simon |
Security Analysis of Auctionity: A Blockchain Based E-Auction
|
2020 |
Lafourcade, Pascal |