TAURIN 2023
|
2024 |
|
ADIoT 2023
|
2024 |
|
An Opportunity-Based Approach to Information Security Risk
|
2024 |
Tran, Dinh Uy |
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges
|
2024 |
Jørgensen, Cecilie Solberg |
The VOCODES Kill Chain for Voice Controllable Devices
|
2024 |
Esposito, Sergio |
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection
|
2024 |
Kalutharage, Chathuranga Sampath |
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86
|
2024 |
Zhou, Yuanding |
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis
|
2024 |
Rajapaksha, Sampath |
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach
|
2024 |
Giagkos, Dimitrios |
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse
|
2024 |
Golinelli, Matteo |
Privacy-Preserving Object Recognition with Explainability in Smart Systems
|
2024 |
Abbasi, Wisam |
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
|
2024 |
Janisch, Jaromír |
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers
|
2024 |
Preuveneers, Davy |
SECAL 2023
|
2024 |
|
PriST-AI 2023
|
2024 |
|
Balancing XAI with Privacy and Security Considerations
|
2024 |
Spartalis, Christoforos N. |
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving
|
2024 |
Abdelsalam, Mohamed |
Firmware-Based DoS Attacks in Wireless Sensor Network
|
2024 |
Lau, Phi Tuong |
Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms
|
2024 |
Grimaldi, Alexandre |
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle
|
2024 |
Kammüller, Florian |