Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era
|
2022 |
Bendoukha, Adda-Akram |
HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM
|
2022 |
Paulin, Dylan |
Automatic Annotation of Confidential Data in Java Code
|
2022 |
Bastys, Julia |
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain
|
2022 |
Ankergård, Sigurd Frej Joel Jørgensen |
Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator
|
2022 |
Heine, Felix |
Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market?
|
2022 |
Seng, S. |
At the Bottom of Binary Analysis: Instructions
|
2022 |
Bonfante, Guillaume |
Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach
|
2022 |
Murray, Hazel |
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits
|
2022 |
Mandal, Kalikinkar |
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems
|
2022 |
Avila, Ricardo |
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection
|
2022 |
Vitorino, João |
A Quantile-Based Watermarking Approach for Distortion Minimization
|
2022 |
Gort, Maikel Läzaro Perez |
A Modular Runtime Enforcement Model Using Multi-traces
|
2022 |
Hallé,, Rania Taleb, Sylvain |
K-Smali: An Executable Semantics for Program Verification of Reversed Android Applications
|
2022 |
Ziadia., Marwa |
Secure and Robust Cyber Security Threat Information Sharing
|
2022 |
Bkakria, Anis |
EXMULF: An Explainable Multimodal Content-Based Fake News Detection System
|
2022 |
Amri, Sabrine |
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts
|
2022 |
Naghmouchi, Montassar |
Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments
|
2022 |
Garcia, Armando Miguel |
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3
|
2022 |
Lounis, Karim |
A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)
|
2022 |
Vinçont, Yaelle |