Backdooring Deep Learning Architectures: Threats and (some) Opportunities
|
2020 |
Barni, Mauro |
Track Down Identity Leaks using Threat Intelligence
|
2020 |
Malderle, Timo |
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool
|
2020 |
Bracamonte, Vanessa |
Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM
|
2020 |
Anagreh, Mohammad |
MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network
|
2020 |
Guerra-Manzanares, Alejandro |
Security of Digital Banking Systems in Poland: Users Study 2019
|
2020 |
Wodo, Wojciech |
Privacy-preserving Surveillance Methods using Homomorphic Encryption
|
2020 |
Bowditch, William |
Revisiting Higher-order Computational Attacks against White-box Implementations
|
2020 |
Maghrebi, Houssem |
Is Ethereum’s ProgPoW ASIC Resistant?
|
2020 |
Orender, Jason |
Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition
|
2020 |
Mendsaikhan, Otgonpurev |
A Comparison of Blockchain-based PKI Implementations
|
2020 |
Brunner, Clemens |
Email Image Spam Classification based on ResNet Convolutional Neural Network
|
2020 |
Listík, Vít |
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria
|
2020 |
Zinsmaier, Sandra Domenique |
Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data Compression
|
2020 |
Schölnast, Hubert |
Homomorphic Encryption at Work for Private Analysis of Security Logs
|
2020 |
Boudguiga, Aymen |
Privacy-preserving Measures in Smart City Video Surveillance Systems
|
2020 |
Sultan, Shizra |
Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing
|
2020 |
Jost, David |
Securing Industrial Production from Sophisticated Cyberattacks
|
2020 |
Sundstrom, Andrew |
Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities
|
2020 |
Butun, Ismail |
Ontology-based Automation of Penetration Testing
|
2020 |
Chu, Ge |