SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials
|
2021 |
Hariri, Ali |
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
|
2021 |
More, Stefan |
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection
|
2021 |
Jang, Hajin |
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware
|
2021 |
Cheng, Kai |
Minecraft Altered Skin Channel (MASC)
|
2021 |
Abrams, Sam |
100 Popular Open-Source Infosec Tools
|
2021 |
Kaksonen, Rauli |
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security
|
2021 |
Lee, Junwon |
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
|
2021 |
Cabral, Warren Z. |
What Is Lurking in Your Backups?
|
2021 |
Lenard, Ben |
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany
|
2021 |
Höller, Paul |
Reconnection-Based Covert Channels in Wireless Networks
|
2021 |
Zillien, Sebastian |
ESQABE: Predicting Encrypted Search Queries
|
2021 |
Meers, Isaac |
HyperSec: Visual Analytics for Blockchain Security Monitoring
|
2021 |
Putz, Benedikt |
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-APP
|
2021 |
Pape, Sebastian |
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators
|
2021 |
Wazan, Ahmad Samer |
Compiling Personal Data and Subject Categories from App Data Models
|
2021 |
Burkert, Christian |
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption
|
2021 |
Špaček, Stanislav |
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems
|
2021 |
Büttner, Andre |
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles
|
2021 |
Bartoszewski, Filip Wieslaw |
How Do Users Chain Email Accounts Together?
|
2021 |
Kraus, Lydia |