A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection
|
2021 |
Motte, Samuel De La |
Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks
|
2021 |
Choi, Young Ah |
Research on Improvement of Anomaly Detection Performance in Industrial Control Systems
|
2021 |
Bae, Sungho |
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms
|
2021 |
Seo, Hwajeong |
Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks
|
2021 |
Lee, Seokmin |
A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems
|
2021 |
Mogg, Raymond |
Quantum Cryptanalysis Landscape of Shor’s Algorithm for Elliptic Curve Discrete Logarithm Problem
|
2021 |
Larasati, Harashta Tatımma |
Anonymous IBE from PEKS: A Generic Construction
|
2021 |
Rhee, Hyun Sook |
Efficient Adaptation of TFHE for High End-to-End Throughput
|
2021 |
Lee, Kang Hoon |
Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor
|
2021 |
Kwak, YuJin |
A Privacy-Preserving Payment Model for EV Charging
|
2021 |
Kim, Jane |
Measuring Healthcare Data Breaches
|
2021 |
Alkinoon, Mohammed |
A General Framework for Matching Pattern Hiding in Deep Packet Inspection
|
2021 |
Wen, Jinghang |
Adaptive Network Security Service Orchestration Based on SDN/NFV
|
2021 |
Ganta, Priyatham |
BadASLR: Exceptional Cases of ASLR Aiding Exploitation
|
2021 |
Jang, Daehee |
LOM: Lightweight Classifier for Obfuscation Methods
|
2021 |
Kim, Jeongwoo |
Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environmentss
|
2021 |
Seo, Chang-Bae |
Secure Computation of Shared Secrets and Its Applications
|
2021 |
Liu, Xin |
Pattern Matching over Encrypted Data with a Short Ciphertext
|
2021 |
Kim, Jongkil |
ARMed Frodo: FrodoKEM on 64-Bit ARMv8 Processors
|
2021 |
Kwon, Hyeokdong |