Fingerprinting of Cellular Infrastructure Based on Broadcast Information
|
2024 |
Bhattacharjee, Anup Kiran |
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
|
2024 |
Hoq, Nazmul |
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection
|
2024 |
Xia, Yifan |
A New Model for Testing IPv6 Fragment Handling
|
2024 |
Paolo, Edoardo Di |
A User-Centric Approach to API Delegations: Enforcing Privacy Policies on OAuth Delegations
|
2024 |
Kalantari, Shirin |
Traffic Analysis by Adversaries with Partial Visibility
|
2024 |
Guirat, Iness Ben |
Achilles” Heels: Vulnerable Record Identification in Synthetic Data Publishing
|
2024 |
Meeus, Matthieu |
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
|
2024 |
Ren, Mengfei |
FSmell: Recognizing Inline Function in Binary Code
|
2024 |
Lin, Wei |
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers
|
2024 |
Vanderlinden, Vik |
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks
|
2024 |
Anghel, Radu |
Protocol Dialects as Formal Patterns
|
2024 |
Galán, D. |
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
|
2024 |
Wolsing, Konrad |
Towards Efficient Privacy-Preserving Deep Packet Inspection
|
2024 |
Wang, Weicheng |
Malware Classification Using Open Set Recognition and HTTP Protocol Requests
|
2024 |
Biatczak, Piotr |
Identity-Based Matchmaking Encryption with Enhanced Privacy — A Generic Construction with Practical Instantiations
|
2024 |
Boyen, Xavier |
LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing
|
2024 |
Liu, Wengqing |
PrivMail: A Privacy-Preserving Framework for Secure Emails
|
2024 |
Chandran, Gowri R. |
Trajectory Hiding and Sharing for Supply Chains with Differential Privacy
|
2024 |
Li, Tianyu |
ResolFuzz: Differential Fuzzing of DNS Resolvers
|
2024 |
Bushart, Jonas |