Defending Against Package Typosquatting
|
2020 |
Taylor, Matthew |
Fixing Vulnerabilities Automatically with Linters
|
2020 |
Rafnsson, Willard |
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking
|
2020 |
Li, Wenjuan |
Multiply, Divide, and Conquer — Making Fully Decentralised Access Control a Reality
|
2020 |
Prünster, Bernd |
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System
|
2020 |
Wang, Xiaodong |
Evading Stepping-Stone Detection with Enough Chaff
|
2020 |
Clausen, Henry |
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence
|
2020 |
Sun, Nan |
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets
|
2020 |
Praitheeshan, Purathani |
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
|
2020 |
Yu, Lianyang |
Compactly Committing Authenticated Encryption Using Tweakable
|
2020 |
Hirose, Shoichi |
Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection
|
2020 |
Engly, Andreas Heidelbach |
PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences
|
2020 |
Yang, Fangfang |
EnCoD: Distinguishing Compressed and Encrypted File Fragments
|
2020 |
Gaspari, Fabio De |
Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
|
2020 |
Mandal, Mriganka |
Model Poisoning Defense on Federated Learning: A. Validation Based Approach
|
2020 |
Wang, Yuao |
Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay
|
2020 |
Ellore, Anish Reddy |
AC° Constructions of Secret Sharing Schemes — Accommodating New Parties
|
2020 |
Chaudhury, Shion Samadder |
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations
|
2020 |
Tang, Jingye |
A Model Specification Implementation for Trust Negotiation
|
2020 |
Kolar, Martin |
ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection
|
2020 |
Chew, Christopher Jun-Wen |