An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage
|
2021 |
Yan, Yan |
Checking Contact Tracing App Implementations
|
2021 |
Flood, Robert |
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets
|
2021 |
Pacheco, Yulexis |
Mobile Robots: An Overview of Data and Security
|
2021 |
Kadena, Esmeralda |
Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework
|
2021 |
Große, Christine |
Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques
|
2021 |
Kotlaba, Lukáš |
Ontology-based cybersecurity and resilience framework
|
2021 |
Hutschenreuter, Helmar |
Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned
|
2021 |
Cholter, William La |
Enabling Monetization of Depreciating Data on Blockchains
|
2021 |
Dahdah, Christian |
Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing
|
2021 |
Jacob, Stephen |
A Dynamic Access Control System based on Situations of Users
|
2021 |
Hasegawa, Hirokazu |
Securing Orchestrated Containers with BSI Module SYS.1.6
|
2021 |
Haar, Christoph |
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption
|
2021 |
Boudguiga, Aymen |
Malware Classification using Long Short-term Memory Models
|
2021 |
Dang, Dennis |
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment
|
2021 |
Casolare, Rosangela |
Accessible Cyber Security: The Next Frontier?
|
2021 |
Renaud, Karen |
A Permissioned Blockchain-based System for Collaborative Drug Discovery
|
2021 |
Olsson, Christoffer |
Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques
|
2021 |
Lounici, Sofiane |
Automatic Detection and Decryption of AES by Monitoring S-Box Access
|
2021 |
Kokeš, Josef |
CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
|
2021 |
Nakata, Ryotaro |