TAURIN 2023
|
2024 |
|
ADIoT 2023
|
2024 |
|
An Opportunity-Based Approach to Information Security Risk
|
2024 |
Tran, Dinh Uy |
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges
|
2024 |
Jørgensen, Cecilie Solberg |
The VOCODES Kill Chain for Voice Controllable Devices
|
2024 |
Esposito, Sergio |
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
|
2024 |
Kalutharage, Chathuranga Sampath |
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
|
2024 |
Zhou, Yuanding |
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis
|
2024 |
Rajapaksha, Sampath |
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach
|
2024 |
Giagkos, Dimitrios |
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse
|
2024 |
Golinelli, Matteo |
Privacy-Preserving Object Recognition with Explainability in Smart Systems
|
2024 |
Abbasi, Wisam |
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
|
2024 |
Janisch, Jaromír |
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers
|
2024 |
Preuveneers, Davy |
WASP 2023
|
2024 |
|
A Methodology for Cybersecurity Risk Assessment in Supply Chains
|
2024 |
Gokkaya, Betul |
User Behavior Analysis for Malware Detection
|
2024 |
Dumitrasc, Valentina |
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime
|
2024 |
Crescenzo, Giovanni Di |
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing
|
2024 |
Maugeri, Marcello |
DNS Dependencies as an Expression of the Digital Divide: The Example of Australia
|
2024 |
Nazemi, Niousha |
Verifiable Fairness: Privacy–preserving Computation of Fairness for Machine Learning Systems
|
2024 |
Toreini, Ehsan |