If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (15. : 2022 : Ottawa) Foundations and practice of security
1. Verfasser: Tam, Anthony (VerfasserIn)
Weitere Verfasser: Alaca, Furkan (VerfasserIn), Barrera, David (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Survey on Identity-Based Blind Signature 2023 Koscina, Mirko
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES 2023 Brisfors, Martin
Towards a Maturity Model for Crypto-Agility Assessment 2023 Hohm, Julian
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms 2023 Casanove, Olivier de
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks 2023 Fraunholz, Daniel
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords 2023 Krentz, Konrad-Felix
Deep-Learning-Based Vulnerability Detection in Binary Executables 2023 Schaad, Andreas
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection 2023 Burda, Pavlo
Security Analysis of Improved EDHOC Protocol 2023 Cottier, Baptiste
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone 2023 Bettaieb, Slim
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications 2023 Bendoukha, Adda Akram
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework 2023 Ayoubi, Solayman
A Taxonomy and Gap-Analysis in Digital Privacy Education 2023 Paul, Sumit Kumar
Defense Models for Data Recovery in Industrial Control Systems 2023 Jawad, Alvi
Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts 2023 Salimpour, Sahar
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes 2023 Tam, Anthony
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis 2023 Fahd, Shah
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher 2023 Ebrahimi, Amirhossein
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter 2023 Mohzary, Muhammad
Where is the Virtual Machine Within CPYTHON? 2023 Bonfante, Guillaume
Alle Artikel auflisten