Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
|
2020 |
Alhebaishi, Nawaf |
Managing Secure Inter-slice Communication in 5G Network Slice Chains
|
2020 |
Suárez, Luis |
Non-interactive Private Decision Tree Evaluation
|
2020 |
Tueno, Anselme |
Privacy-Preserving Anomaly Detection Using Synthetic Data
|
2020 |
Mayer, Rudolf |
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud
|
2020 |
Meijaard, Yoram J. |
PUA Detection Based on Bundle Installer Characteristics
|
2020 |
Lukach, Amir |
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Too
|
2020 |
Schaad, Andreas |
Information Flow Security Certification for SPARK Programs
|
2020 |
Ghosal, Sandip |
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study
|
2020 |
Tahmasebian, Farnaz |
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation
|
2020 |
Ciucanu, Radu |
Readability of Privacy Policies
|
2020 |
Krumay, Barbara |
Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
|
2020 |
Biskup, Joachim |
Security Enumerations for Cyber-Physical Systems
|
2020 |
Schlette, Daniel |
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
|
2020 |
Zaki, Marian |
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids
|
2020 |
Stübs, Marius |
Local Differentially Private Matrix Factorization with MoG for Recommendations
|
2020 |
Neera, Jeyamohan |
Designing a Decision-Support Visualization for Live Digital Forensic Investigations
|
2020 |
Böhm, Fabian |
Self-enhancing GPS-Based Authentication Using Corresponding Address
|
2020 |
Thao, Tran Phuong |
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
|
2020 |
Dolan, Andy |
Network Functions Virtualization Access Control as a Service
|
2020 |
Smine, Manel |